Hay
Date
June 18, 2025, 6:43 a.m.

Environment
qemu-arm64
qemu-x86_64

[   24.047078] ==================================================================
[   24.047210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   24.047326] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.047429] 
[   24.047513] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.047743] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.048188] Hardware name: linux,dummy-virt (DT)
[   24.048287] Call trace:
[   24.048345]  show_stack+0x20/0x38 (C)
[   24.048481]  dump_stack_lvl+0x8c/0xd0
[   24.048621]  print_report+0x118/0x608
[   24.048743]  kasan_report+0xdc/0x128
[   24.048861]  kasan_check_range+0x100/0x1a8
[   24.048989]  __kasan_check_write+0x20/0x30
[   24.049122]  kasan_atomics_helper+0xeb8/0x4858
[   24.049246]  kasan_atomics+0x198/0x2e0
[   24.049360]  kunit_try_run_case+0x170/0x3f0
[   24.049487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.049622]  kthread+0x328/0x630
[   24.049731]  ret_from_fork+0x10/0x20
[   24.049853] 
[   24.049903] Allocated by task 275:
[   24.049978]  kasan_save_stack+0x3c/0x68
[   24.050606]  kasan_save_track+0x20/0x40
[   24.050734]  kasan_save_alloc_info+0x40/0x58
[   24.050846]  __kasan_kmalloc+0xd4/0xd8
[   24.050941]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.051162]  kasan_atomics+0xb8/0x2e0
[   24.051336]  kunit_try_run_case+0x170/0x3f0
[   24.051450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.052044]  kthread+0x328/0x630
[   24.052385]  ret_from_fork+0x10/0x20
[   24.052514] 
[   24.052580] The buggy address belongs to the object at fff00000c63eb100
[   24.052580]  which belongs to the cache kmalloc-64 of size 64
[   24.052724] The buggy address is located 0 bytes to the right of
[   24.052724]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.053047] 
[   24.053120] The buggy address belongs to the physical page:
[   24.053540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.053820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.053962] page_type: f5(slab)
[   24.054103] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.054252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.054406] page dumped because: kasan: bad access detected
[   24.054490] 
[   24.054542] Memory state around the buggy address:
[   24.054614]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.054736]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.054848] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.054944]                                      ^
[   24.055041]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.055369]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.055497] ==================================================================
[   23.838043] ==================================================================
[   23.838646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   23.839188] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.839307] 
[   23.839714] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.840356] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.840484] Hardware name: linux,dummy-virt (DT)
[   23.840666] Call trace:
[   23.840736]  show_stack+0x20/0x38 (C)
[   23.840941]  dump_stack_lvl+0x8c/0xd0
[   23.841072]  print_report+0x118/0x608
[   23.841189]  kasan_report+0xdc/0x128
[   23.841358]  kasan_check_range+0x100/0x1a8
[   23.841471]  __kasan_check_write+0x20/0x30
[   23.841582]  kasan_atomics_helper+0xa04/0x4858
[   23.841698]  kasan_atomics+0x198/0x2e0
[   23.841816]  kunit_try_run_case+0x170/0x3f0
[   23.841967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.842163]  kthread+0x328/0x630
[   23.842257]  ret_from_fork+0x10/0x20
[   23.842413] 
[   23.842454] Allocated by task 275:
[   23.842535]  kasan_save_stack+0x3c/0x68
[   23.842634]  kasan_save_track+0x20/0x40
[   23.842718]  kasan_save_alloc_info+0x40/0x58
[   23.842846]  __kasan_kmalloc+0xd4/0xd8
[   23.842941]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.843047]  kasan_atomics+0xb8/0x2e0
[   23.843174]  kunit_try_run_case+0x170/0x3f0
[   23.843257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.843385]  kthread+0x328/0x630
[   23.843559]  ret_from_fork+0x10/0x20
[   23.843668] 
[   23.843730] The buggy address belongs to the object at fff00000c63eb100
[   23.843730]  which belongs to the cache kmalloc-64 of size 64
[   23.843864] The buggy address is located 0 bytes to the right of
[   23.843864]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.844028] 
[   23.844100] The buggy address belongs to the physical page:
[   23.844255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.844365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.844472] page_type: f5(slab)
[   23.844600] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.844767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.844890] page dumped because: kasan: bad access detected
[   23.844965] 
[   23.845032] Memory state around the buggy address:
[   23.845132]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.845236]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.845340] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.845430]                                      ^
[   23.845507]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.845611]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.845706] ==================================================================
[   24.089663] ==================================================================
[   24.089796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   24.089927] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.090062] 
[   24.090909] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.091649] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.091889] Hardware name: linux,dummy-virt (DT)
[   24.092321] Call trace:
[   24.092407]  show_stack+0x20/0x38 (C)
[   24.093157]  dump_stack_lvl+0x8c/0xd0
[   24.093583]  print_report+0x118/0x608
[   24.093712]  kasan_report+0xdc/0x128
[   24.093822]  kasan_check_range+0x100/0x1a8
[   24.094567]  __kasan_check_write+0x20/0x30
[   24.094804]  kasan_atomics_helper+0x1058/0x4858
[   24.095294]  kasan_atomics+0x198/0x2e0
[   24.095494]  kunit_try_run_case+0x170/0x3f0
[   24.095670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.095998]  kthread+0x328/0x630
[   24.096346]  ret_from_fork+0x10/0x20
[   24.096475] 
[   24.096538] Allocated by task 275:
[   24.096618]  kasan_save_stack+0x3c/0x68
[   24.096731]  kasan_save_track+0x20/0x40
[   24.097481]  kasan_save_alloc_info+0x40/0x58
[   24.097932]  __kasan_kmalloc+0xd4/0xd8
[   24.098330]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.098482]  kasan_atomics+0xb8/0x2e0
[   24.098570]  kunit_try_run_case+0x170/0x3f0
[   24.099030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.099227]  kthread+0x328/0x630
[   24.099320]  ret_from_fork+0x10/0x20
[   24.099755] 
[   24.099808] The buggy address belongs to the object at fff00000c63eb100
[   24.099808]  which belongs to the cache kmalloc-64 of size 64
[   24.100592] The buggy address is located 0 bytes to the right of
[   24.100592]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.100813] 
[   24.100876] The buggy address belongs to the physical page:
[   24.101295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.101492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.101722] page_type: f5(slab)
[   24.101974] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.102639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.103143] page dumped because: kasan: bad access detected
[   24.103316] 
[   24.103671] Memory state around the buggy address:
[   24.103790]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.103902]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.104006] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.104698]                                      ^
[   24.104923]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.105289]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.105867] ==================================================================
[   24.067121] ==================================================================
[   24.067252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   24.067439] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.067782] 
[   24.067904] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.068146] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.068349] Hardware name: linux,dummy-virt (DT)
[   24.068550] Call trace:
[   24.068652]  show_stack+0x20/0x38 (C)
[   24.069201]  dump_stack_lvl+0x8c/0xd0
[   24.069383]  print_report+0x118/0x608
[   24.069507]  kasan_report+0xdc/0x128
[   24.069617]  kasan_check_range+0x100/0x1a8
[   24.069732]  __kasan_check_write+0x20/0x30
[   24.069839]  kasan_atomics_helper+0xf88/0x4858
[   24.070171]  kasan_atomics+0x198/0x2e0
[   24.070428]  kunit_try_run_case+0x170/0x3f0
[   24.070560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.070696]  kthread+0x328/0x630
[   24.070795]  ret_from_fork+0x10/0x20
[   24.070921] 
[   24.070966] Allocated by task 275:
[   24.071066]  kasan_save_stack+0x3c/0x68
[   24.071163]  kasan_save_track+0x20/0x40
[   24.071257]  kasan_save_alloc_info+0x40/0x58
[   24.071360]  __kasan_kmalloc+0xd4/0xd8
[   24.071456]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.071603]  kasan_atomics+0xb8/0x2e0
[   24.071704]  kunit_try_run_case+0x170/0x3f0
[   24.071837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.071987]  kthread+0x328/0x630
[   24.072113]  ret_from_fork+0x10/0x20
[   24.072240] 
[   24.072294] The buggy address belongs to the object at fff00000c63eb100
[   24.072294]  which belongs to the cache kmalloc-64 of size 64
[   24.072439] The buggy address is located 0 bytes to the right of
[   24.072439]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.072628] 
[   24.072709] The buggy address belongs to the physical page:
[   24.072821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.072962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.073077] page_type: f5(slab)
[   24.073171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.073295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.073433] page dumped because: kasan: bad access detected
[   24.073519] 
[   24.073562] Memory state around the buggy address:
[   24.073644]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.073758]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.073870] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.073988]                                      ^
[   24.074125]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.074183]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.074230] ==================================================================
[   23.824818] ==================================================================
[   23.824953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   23.825108] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.825243] 
[   23.825353] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.825570] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.825631] Hardware name: linux,dummy-virt (DT)
[   23.825700] Call trace:
[   23.825753]  show_stack+0x20/0x38 (C)
[   23.825844]  dump_stack_lvl+0x8c/0xd0
[   23.825940]  print_report+0x118/0x608
[   23.826052]  kasan_report+0xdc/0x128
[   23.826242]  kasan_check_range+0x100/0x1a8
[   23.826440]  __kasan_check_write+0x20/0x30
[   23.826552]  kasan_atomics_helper+0x934/0x4858
[   23.826676]  kasan_atomics+0x198/0x2e0
[   23.826782]  kunit_try_run_case+0x170/0x3f0
[   23.826879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.826981]  kthread+0x328/0x630
[   23.827112]  ret_from_fork+0x10/0x20
[   23.827219] 
[   23.827258] Allocated by task 275:
[   23.827318]  kasan_save_stack+0x3c/0x68
[   23.827414]  kasan_save_track+0x20/0x40
[   23.827490]  kasan_save_alloc_info+0x40/0x58
[   23.827554]  __kasan_kmalloc+0xd4/0xd8
[   23.827621]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.827691]  kasan_atomics+0xb8/0x2e0
[   23.827752]  kunit_try_run_case+0x170/0x3f0
[   23.827822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.828459] The buggy address is located 0 bytes to the right of
[   23.828459]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.828636] 
[   23.828717] The buggy address belongs to the physical page:
[   23.828842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.828987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.829118] page_type: f5(slab)
[   23.829210] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.829346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.829441] page dumped because: kasan: bad access detected
[   23.829601] 
[   23.829653] Memory state around the buggy address:
[   23.829737]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.829844]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.829952] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.830099]                                      ^
[   23.830176]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.830295]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.830415] ==================================================================
[   24.240386] ==================================================================
[   24.240856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   24.240933] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.240992] 
[   24.241049] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.241154] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.241190] Hardware name: linux,dummy-virt (DT)
[   24.241229] Call trace:
[   24.241261]  show_stack+0x20/0x38 (C)
[   24.241321]  dump_stack_lvl+0x8c/0xd0
[   24.241378]  print_report+0x118/0x608
[   24.241433]  kasan_report+0xdc/0x128
[   24.241487]  kasan_check_range+0x100/0x1a8
[   24.241543]  __kasan_check_write+0x20/0x30
[   24.241594]  kasan_atomics_helper+0x1644/0x4858
[   24.241650]  kasan_atomics+0x198/0x2e0
[   24.241702]  kunit_try_run_case+0x170/0x3f0
[   24.241756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.241816]  kthread+0x328/0x630
[   24.241865]  ret_from_fork+0x10/0x20
[   24.241921] 
[   24.241947] Allocated by task 275:
[   24.241982]  kasan_save_stack+0x3c/0x68
[   24.244610]  kasan_save_track+0x20/0x40
[   24.244762]  kasan_save_alloc_info+0x40/0x58
[   24.245046]  __kasan_kmalloc+0xd4/0xd8
[   24.245277]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.245373]  kasan_atomics+0xb8/0x2e0
[   24.245419]  kunit_try_run_case+0x170/0x3f0
[   24.245509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.245916]  kthread+0x328/0x630
[   24.246063]  ret_from_fork+0x10/0x20
[   24.247008] 
[   24.247055] The buggy address belongs to the object at fff00000c63eb100
[   24.247055]  which belongs to the cache kmalloc-64 of size 64
[   24.247312] The buggy address is located 0 bytes to the right of
[   24.247312]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.247561] 
[   24.247759] The buggy address belongs to the physical page:
[   24.248321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.248772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.249373] page_type: f5(slab)
[   24.249672] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.250130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.250190] page dumped because: kasan: bad access detected
[   24.250712] 
[   24.251050] Memory state around the buggy address:
[   24.251144]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.251200]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.251248] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.251290]                                      ^
[   24.251329]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.252212]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.252838] ==================================================================
[   23.871287] ==================================================================
[   23.871639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   23.871773] Read of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.872109] 
[   23.872208] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.872912] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.873003] Hardware name: linux,dummy-virt (DT)
[   23.873103] Call trace:
[   23.873165]  show_stack+0x20/0x38 (C)
[   23.873686]  dump_stack_lvl+0x8c/0xd0
[   23.874189]  print_report+0x118/0x608
[   23.874363]  kasan_report+0xdc/0x128
[   23.874553]  __asan_report_load4_noabort+0x20/0x30
[   23.875116]  kasan_atomics_helper+0x3dcc/0x4858
[   23.875328]  kasan_atomics+0x198/0x2e0
[   23.875485]  kunit_try_run_case+0x170/0x3f0
[   23.875691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.875835]  kthread+0x328/0x630
[   23.875950]  ret_from_fork+0x10/0x20
[   23.876809] 
[   23.876917] Allocated by task 275:
[   23.877050]  kasan_save_stack+0x3c/0x68
[   23.877165]  kasan_save_track+0x20/0x40
[   23.877259]  kasan_save_alloc_info+0x40/0x58
[   23.877363]  __kasan_kmalloc+0xd4/0xd8
[   23.878000]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.878347]  kasan_atomics+0xb8/0x2e0
[   23.878470]  kunit_try_run_case+0x170/0x3f0
[   23.878824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.878961]  kthread+0x328/0x630
[   23.879071]  ret_from_fork+0x10/0x20
[   23.879521] 
[   23.879696] The buggy address belongs to the object at fff00000c63eb100
[   23.879696]  which belongs to the cache kmalloc-64 of size 64
[   23.880257] The buggy address is located 0 bytes to the right of
[   23.880257]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.880635] 
[   23.880730] The buggy address belongs to the physical page:
[   23.880823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.880969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.881118] page_type: f5(slab)
[   23.881854] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.882060] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.882386] page dumped because: kasan: bad access detected
[   23.882478] 
[   23.882710] Memory state around the buggy address:
[   23.882801]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.883388]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.883547] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.883727]                                      ^
[   23.883814]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.884359]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.884485] ==================================================================
[   24.178660] ==================================================================
[   24.178865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   24.179009] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.179137] 
[   24.179254] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.179459] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.179531] Hardware name: linux,dummy-virt (DT)
[   24.179598] Call trace:
[   24.179643]  show_stack+0x20/0x38 (C)
[   24.179745]  dump_stack_lvl+0x8c/0xd0
[   24.179855]  print_report+0x118/0x608
[   24.179972]  kasan_report+0xdc/0x128
[   24.180111]  __asan_report_load8_noabort+0x20/0x30
[   24.180275]  kasan_atomics_helper+0x3f04/0x4858
[   24.180437]  kasan_atomics+0x198/0x2e0
[   24.180569]  kunit_try_run_case+0x170/0x3f0
[   24.180694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.180831]  kthread+0x328/0x630
[   24.180943]  ret_from_fork+0x10/0x20
[   24.181077] 
[   24.181127] Allocated by task 275:
[   24.181201]  kasan_save_stack+0x3c/0x68
[   24.181303]  kasan_save_track+0x20/0x40
[   24.181399]  kasan_save_alloc_info+0x40/0x58
[   24.181498]  __kasan_kmalloc+0xd4/0xd8
[   24.181589]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.181686]  kasan_atomics+0xb8/0x2e0
[   24.181774]  kunit_try_run_case+0x170/0x3f0
[   24.181867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.181975]  kthread+0x328/0x630
[   24.182089]  ret_from_fork+0x10/0x20
[   24.182181] 
[   24.182269] The buggy address belongs to the object at fff00000c63eb100
[   24.182269]  which belongs to the cache kmalloc-64 of size 64
[   24.182410] The buggy address is located 0 bytes to the right of
[   24.182410]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.182583] 
[   24.182653] The buggy address belongs to the physical page:
[   24.182751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.182894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.183057] page_type: f5(slab)
[   24.183152] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.183282] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.183386] page dumped because: kasan: bad access detected
[   24.183465] 
[   24.183511] Memory state around the buggy address:
[   24.183587]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.183694]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.183798] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.183903]                                      ^
[   24.184027]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.184128]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.184247] ==================================================================
[   23.788348] ==================================================================
[   23.788718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   23.788873] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.789501] Hardware name: linux,dummy-virt (DT)
[   23.790327]  dump_stack_lvl+0x8c/0xd0
[   23.790444]  print_report+0x118/0x608
[   23.790544]  kasan_report+0xdc/0x128
[   23.790982]  kasan_atomics_helper+0x760/0x4858
[   23.791114]  kasan_atomics+0x198/0x2e0
[   23.791331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.791468]  kthread+0x328/0x630
[   23.792015] 
[   23.792079] Allocated by task 275:
[   23.792427]  kasan_save_alloc_info+0x40/0x58
[   23.792821]  kunit_try_run_case+0x170/0x3f0
[   23.792921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.793417] The buggy address is located 0 bytes to the right of
[   23.793417]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.794585] page_type: f5(slab)
[   23.794894]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.795222] ==================================================================
[   23.885736] ==================================================================
[   23.885885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   23.886501] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.886649] 
[   23.886722] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.886950] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.887263] Hardware name: linux,dummy-virt (DT)
[   23.887504] Call trace:
[   23.887649]  show_stack+0x20/0x38 (C)
[   23.888201]  dump_stack_lvl+0x8c/0xd0
[   23.888578]  print_report+0x118/0x608
[   23.889117]  kasan_report+0xdc/0x128
[   23.889333]  kasan_check_range+0x100/0x1a8
[   23.889468]  __kasan_check_write+0x20/0x30
[   23.889784]  kasan_atomics_helper+0xb70/0x4858
[   23.890198]  kasan_atomics+0x198/0x2e0
[   23.890489]  kunit_try_run_case+0x170/0x3f0
[   23.890627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.890756]  kthread+0x328/0x630
[   23.890861]  ret_from_fork+0x10/0x20
[   23.891357] 
[   23.891441] Allocated by task 275:
[   23.891866]  kasan_save_stack+0x3c/0x68
[   23.892003]  kasan_save_track+0x20/0x40
[   23.892114]  kasan_save_alloc_info+0x40/0x58
[   23.892468]  __kasan_kmalloc+0xd4/0xd8
[   23.892670]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.892789]  kasan_atomics+0xb8/0x2e0
[   23.893141]  kunit_try_run_case+0x170/0x3f0
[   23.893284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.893642]  kthread+0x328/0x630
[   23.894183]  ret_from_fork+0x10/0x20
[   23.894321] 
[   23.894375] The buggy address belongs to the object at fff00000c63eb100
[   23.894375]  which belongs to the cache kmalloc-64 of size 64
[   23.894504] The buggy address is located 0 bytes to the right of
[   23.894504]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.894656] 
[   23.894714] The buggy address belongs to the physical page:
[   23.894810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.894940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.896038] page_type: f5(slab)
[   23.896590] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.897224] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.897339] page dumped because: kasan: bad access detected
[   23.897429] 
[   23.897844] Memory state around the buggy address:
[   23.897946]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.901544] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   23.908518]  ret_from_fork+0x10/0x20
[   23.911463] page_type: f5(slab)
[   23.912377] 
[   23.912576]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.912733]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.913074] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.913417]                                      ^
[   23.913868]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.916069] 
[   23.916704] Hardware name: linux,dummy-virt (DT)
[   23.918877]  __kasan_check_write+0x20/0x30
[   23.920551]  kthread+0x328/0x630
[   23.922769]  kasan_atomics+0xb8/0x2e0
[   23.924860] 
[   23.926836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.927618]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.927934] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.928271]                                      ^
[   23.928923] ==================================================================
[   24.279157] ==================================================================
[   24.279226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   24.279294] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.279353] 
[   24.279396] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.279498] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.279536] Hardware name: linux,dummy-virt (DT)
[   24.279575] Call trace:
[   24.279604]  show_stack+0x20/0x38 (C)
[   24.279665]  dump_stack_lvl+0x8c/0xd0
[   24.279722]  print_report+0x118/0x608
[   24.279777]  kasan_report+0xdc/0x128
[   24.279832]  __asan_report_load8_noabort+0x20/0x30
[   24.279895]  kasan_atomics_helper+0x3e10/0x4858
[   24.279951]  kasan_atomics+0x198/0x2e0
[   24.280005]  kunit_try_run_case+0x170/0x3f0
[   24.280079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.280141]  kthread+0x328/0x630
[   24.280191]  ret_from_fork+0x10/0x20
[   24.283218] 
[   24.283572] Allocated by task 275:
[   24.283622]  kasan_save_stack+0x3c/0x68
[   24.284440]  kasan_save_track+0x20/0x40
[   24.284947]  kasan_save_alloc_info+0x40/0x58
[   24.285221]  __kasan_kmalloc+0xd4/0xd8
[   24.285992]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.286215]  kasan_atomics+0xb8/0x2e0
[   24.286374]  kunit_try_run_case+0x170/0x3f0
[   24.286474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.286522]  kthread+0x328/0x630
[   24.286559]  ret_from_fork+0x10/0x20
[   24.286597] 
[   24.286624] The buggy address belongs to the object at fff00000c63eb100
[   24.286624]  which belongs to the cache kmalloc-64 of size 64
[   24.287848] The buggy address is located 0 bytes to the right of
[   24.287848]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.287937] 
[   24.287965] The buggy address belongs to the physical page:
[   24.288654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.288750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.288824] page_type: f5(slab)
[   24.288876] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.289659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.289889] page dumped because: kasan: bad access detected
[   24.290484] 
[   24.290604] Memory state around the buggy address:
[   24.290657]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.290713]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.290763] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.290807]                                      ^
[   24.290846]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.290892]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.290933] ==================================================================
[   24.292574] ==================================================================
[   24.293327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   24.294093] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.294247] 
[   24.294444] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.294840] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.294876] Hardware name: linux,dummy-virt (DT)
[   24.294914] Call trace:
[   24.294944]  show_stack+0x20/0x38 (C)
[   24.295009]  dump_stack_lvl+0x8c/0xd0
[   24.295081]  print_report+0x118/0x608
[   24.296428]  kasan_report+0xdc/0x128
[   24.296696]  kasan_check_range+0x100/0x1a8
[   24.296762]  __kasan_check_write+0x20/0x30
[   24.296818]  kasan_atomics_helper+0x175c/0x4858
[   24.296875]  kasan_atomics+0x198/0x2e0
[   24.298262]  kunit_try_run_case+0x170/0x3f0
[   24.298323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.298382]  kthread+0x328/0x630
[   24.299231]  ret_from_fork+0x10/0x20
[   24.299316] 
[   24.299345] Allocated by task 275:
[   24.299714]  kasan_save_stack+0x3c/0x68
[   24.299907]  kasan_save_track+0x20/0x40
[   24.300113]  kasan_save_alloc_info+0x40/0x58
[   24.300307]  __kasan_kmalloc+0xd4/0xd8
[   24.300520]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.300587]  kasan_atomics+0xb8/0x2e0
[   24.300634]  kunit_try_run_case+0x170/0x3f0
[   24.301491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.301625]  kthread+0x328/0x630
[   24.301770]  ret_from_fork+0x10/0x20
[   24.302166] 
[   24.302199] The buggy address belongs to the object at fff00000c63eb100
[   24.302199]  which belongs to the cache kmalloc-64 of size 64
[   24.302269] The buggy address is located 0 bytes to the right of
[   24.302269]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.302659] 
[   24.302760] The buggy address belongs to the physical page:
[   24.303043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.303567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.303755] page_type: f5(slab)
[   24.303811] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.303871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.303917] page dumped because: kasan: bad access detected
[   24.303956] 
[   24.303978] Memory state around the buggy address:
[   24.304029]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.304089]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.304140] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.304186]                                      ^
[   24.304228]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.304278]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.304379] ==================================================================
[   24.109346] ==================================================================
[   24.110059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   24.111013] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.111322] 
[   24.111635] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.112758] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.112843] Hardware name: linux,dummy-virt (DT)
[   24.113423] Call trace:
[   24.113622]  show_stack+0x20/0x38 (C)
[   24.114244]  dump_stack_lvl+0x8c/0xd0
[   24.114699]  print_report+0x118/0x608
[   24.114992]  kasan_report+0xdc/0x128
[   24.115638]  kasan_check_range+0x100/0x1a8
[   24.116001]  __kasan_check_write+0x20/0x30
[   24.116970]  kasan_atomics_helper+0x10c0/0x4858
[   24.117561]  kasan_atomics+0x198/0x2e0
[   24.117724]  kunit_try_run_case+0x170/0x3f0
[   24.117889]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.118089]  kthread+0x328/0x630
[   24.118190]  ret_from_fork+0x10/0x20
[   24.118420] 
[   24.118593] Allocated by task 275:
[   24.118733]  kasan_save_stack+0x3c/0x68
[   24.118842]  kasan_save_track+0x20/0x40
[   24.118927]  kasan_save_alloc_info+0x40/0x58
[   24.119008]  __kasan_kmalloc+0xd4/0xd8
[   24.119289]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.119388]  kasan_atomics+0xb8/0x2e0
[   24.119476]  kunit_try_run_case+0x170/0x3f0
[   24.119832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.120003]  kthread+0x328/0x630
[   24.120099]  ret_from_fork+0x10/0x20
[   24.120407] 
[   24.120502] The buggy address belongs to the object at fff00000c63eb100
[   24.120502]  which belongs to the cache kmalloc-64 of size 64
[   24.120702] The buggy address is located 0 bytes to the right of
[   24.120702]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.120901] 
[   24.120976] The buggy address belongs to the physical page:
[   24.121078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.121229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.121518] page_type: f5(slab)
[   24.121629] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.121757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.121861] page dumped because: kasan: bad access detected
[   24.121952] 
[   24.122029] Memory state around the buggy address:
[   24.122146]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.122295]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.122437] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.122570]                                      ^
[   24.122683]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.122823]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.122925] ==================================================================
[   24.254313] ==================================================================
[   24.254514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   24.255301] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.255488] 
[   24.255582] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.256039] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.256189] Hardware name: linux,dummy-virt (DT)
[   24.256324] Call trace:
[   24.256447]  show_stack+0x20/0x38 (C)
[   24.256555]  dump_stack_lvl+0x8c/0xd0
[   24.256944]  print_report+0x118/0x608
[   24.257008]  kasan_report+0xdc/0x128
[   24.257082]  __asan_report_load8_noabort+0x20/0x30
[   24.257261]  kasan_atomics_helper+0x3df4/0x4858
[   24.257331]  kasan_atomics+0x198/0x2e0
[   24.257434]  kunit_try_run_case+0x170/0x3f0
[   24.257494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.257557]  kthread+0x328/0x630
[   24.257606]  ret_from_fork+0x10/0x20
[   24.257665] 
[   24.257924] Allocated by task 275:
[   24.258114]  kasan_save_stack+0x3c/0x68
[   24.258319]  kasan_save_track+0x20/0x40
[   24.258371]  kasan_save_alloc_info+0x40/0x58
[   24.258814]  __kasan_kmalloc+0xd4/0xd8
[   24.258865]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.259318]  kasan_atomics+0xb8/0x2e0
[   24.259816]  kunit_try_run_case+0x170/0x3f0
[   24.259878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.259931]  kthread+0x328/0x630
[   24.259969]  ret_from_fork+0x10/0x20
[   24.260662] 
[   24.260981] The buggy address belongs to the object at fff00000c63eb100
[   24.260981]  which belongs to the cache kmalloc-64 of size 64
[   24.261440] The buggy address is located 0 bytes to the right of
[   24.261440]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.261815] 
[   24.262011] The buggy address belongs to the physical page:
[   24.262167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.262256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.262318] page_type: f5(slab)
[   24.262366] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.262426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.262473] page dumped because: kasan: bad access detected
[   24.262511] 
[   24.262534] Memory state around the buggy address:
[   24.262574]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.262625]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.262675] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.264697]                                      ^
[   24.264898]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.264955]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.265003] ==================================================================
[   23.962843] ==================================================================
[   23.963652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   23.963821] Read of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.963957] 
[   23.964068] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.964293] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.964378] Hardware name: linux,dummy-virt (DT)
[   23.964466] Call trace:
[   23.964541]  show_stack+0x20/0x38 (C)
[   23.964680]  dump_stack_lvl+0x8c/0xd0
[   23.964811]  print_report+0x118/0x608
[   23.964940]  kasan_report+0xdc/0x128
[   23.965079]  __asan_report_load4_noabort+0x20/0x30
[   23.967145]  kasan_atomics_helper+0x3dd8/0x4858
[   23.967408]  kasan_atomics+0x198/0x2e0
[   23.967986]  kunit_try_run_case+0x170/0x3f0
[   23.968217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.968786]  kthread+0x328/0x630
[   23.968931]  ret_from_fork+0x10/0x20
[   23.969070] 
[   23.969326] Allocated by task 275:
[   23.969452]  kasan_save_stack+0x3c/0x68
[   23.970082]  kasan_save_track+0x20/0x40
[   23.970203]  kasan_save_alloc_info+0x40/0x58
[   23.970680]  __kasan_kmalloc+0xd4/0xd8
[   23.970800]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.970907]  kasan_atomics+0xb8/0x2e0
[   23.971512]  kunit_try_run_case+0x170/0x3f0
[   23.971871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.972224]  kthread+0x328/0x630
[   23.972373]  ret_from_fork+0x10/0x20
[   23.972465] 
[   23.972514] The buggy address belongs to the object at fff00000c63eb100
[   23.972514]  which belongs to the cache kmalloc-64 of size 64
[   23.972939] The buggy address is located 0 bytes to the right of
[   23.972939]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.973588] 
[   23.973676] The buggy address belongs to the physical page:
[   23.974049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.974300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.974434] page_type: f5(slab)
[   23.974529] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.974910] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.975476] page dumped because: kasan: bad access detected
[   23.975573] 
[   23.975678] Memory state around the buggy address:
[   23.975780]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.976462]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.976607] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.976716]                                      ^
[   23.977048]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.977568]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.978070] ==================================================================
[   24.199140] ==================================================================
[   24.199309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   24.199479] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.199648] 
[   24.199756] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.200069] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.200185] Hardware name: linux,dummy-virt (DT)
[   24.200293] Call trace:
[   24.200359]  show_stack+0x20/0x38 (C)
[   24.200462]  dump_stack_lvl+0x8c/0xd0
[   24.200566]  print_report+0x118/0x608
[   24.200655]  kasan_report+0xdc/0x128
[   24.200739]  kasan_check_range+0x100/0x1a8
[   24.200855]  __kasan_check_write+0x20/0x30
[   24.200979]  kasan_atomics_helper+0x14e4/0x4858
[   24.201107]  kasan_atomics+0x198/0x2e0
[   24.201213]  kunit_try_run_case+0x170/0x3f0
[   24.201376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.201507]  kthread+0x328/0x630
[   24.201602]  ret_from_fork+0x10/0x20
[   24.201738] 
[   24.201792] Allocated by task 275:
[   24.201890]  kasan_save_stack+0x3c/0x68
[   24.201993]  kasan_save_track+0x20/0x40
[   24.202111]  kasan_save_alloc_info+0x40/0x58
[   24.202266]  __kasan_kmalloc+0xd4/0xd8
[   24.203422]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.204111]  kasan_atomics+0xb8/0x2e0
[   24.204218]  kunit_try_run_case+0x170/0x3f0
[   24.204855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.205383]  kthread+0x328/0x630
[   24.205467]  ret_from_fork+0x10/0x20
[   24.205738] 
[   24.205907] The buggy address belongs to the object at fff00000c63eb100
[   24.205907]  which belongs to the cache kmalloc-64 of size 64
[   24.206336] The buggy address is located 0 bytes to the right of
[   24.206336]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.206491] 
[   24.206545] The buggy address belongs to the physical page:
[   24.206652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.206829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.206964] page_type: f5(slab)
[   24.207064] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.207187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.207288] page dumped because: kasan: bad access detected
[   24.207369] 
[   24.207436] Memory state around the buggy address:
[   24.207518]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.207630]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.207741] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.207819]                                      ^
[   24.208471]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.208641]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.208766] ==================================================================
[   24.171968] ==================================================================
[   24.172138] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   24.172289] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.172414] 
[   24.172503] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.172734] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.172801] Hardware name: linux,dummy-virt (DT)
[   24.172869] Call trace:
[   24.172927]  show_stack+0x20/0x38 (C)
[   24.173058]  dump_stack_lvl+0x8c/0xd0
[   24.173182]  print_report+0x118/0x608
[   24.173309]  kasan_report+0xdc/0x128
[   24.173429]  kasan_check_range+0x100/0x1a8
[   24.173555]  __kasan_check_write+0x20/0x30
[   24.173675]  kasan_atomics_helper+0x1384/0x4858
[   24.173800]  kasan_atomics+0x198/0x2e0
[   24.173919]  kunit_try_run_case+0x170/0x3f0
[   24.174061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.174210]  kthread+0x328/0x630
[   24.174367]  ret_from_fork+0x10/0x20
[   24.174494] 
[   24.174576] Allocated by task 275:
[   24.174671]  kasan_save_stack+0x3c/0x68
[   24.174811]  kasan_save_track+0x20/0x40
[   24.174943]  kasan_save_alloc_info+0x40/0x58
[   24.175099]  __kasan_kmalloc+0xd4/0xd8
[   24.175236]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.175370]  kasan_atomics+0xb8/0x2e0
[   24.175496]  kunit_try_run_case+0x170/0x3f0
[   24.175621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.175733]  kthread+0x328/0x630
[   24.175812]  ret_from_fork+0x10/0x20
[   24.175897] 
[   24.175942] The buggy address belongs to the object at fff00000c63eb100
[   24.175942]  which belongs to the cache kmalloc-64 of size 64
[   24.176079] The buggy address is located 0 bytes to the right of
[   24.176079]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.176243] 
[   24.176296] The buggy address belongs to the physical page:
[   24.176381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.176539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.176725] page_type: f5(slab)
[   24.176823] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.177005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.177115] page dumped because: kasan: bad access detected
[   24.177217] 
[   24.177267] Memory state around the buggy address:
[   24.177373]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.177491]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.177589] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.177683]                                      ^
[   24.177776]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.177896]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.177992] ==================================================================
[   24.317777] ==================================================================
[   24.317851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   24.317921] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.317979] 
[   24.318033] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.320181] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.320238] Hardware name: linux,dummy-virt (DT)
[   24.320280] Call trace:
[   24.320314]  show_stack+0x20/0x38 (C)
[   24.320382]  dump_stack_lvl+0x8c/0xd0
[   24.320445]  print_report+0x118/0x608
[   24.320503]  kasan_report+0xdc/0x128
[   24.320572]  kasan_check_range+0x100/0x1a8
[   24.320634]  __kasan_check_write+0x20/0x30
[   24.321522]  kasan_atomics_helper+0x17ec/0x4858
[   24.321989]  kasan_atomics+0x198/0x2e0
[   24.322860]  kunit_try_run_case+0x170/0x3f0
[   24.322972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.323052]  kthread+0x328/0x630
[   24.323109]  ret_from_fork+0x10/0x20
[   24.323169] 
[   24.324074] Allocated by task 275:
[   24.324140]  kasan_save_stack+0x3c/0x68
[   24.324202]  kasan_save_track+0x20/0x40
[   24.324248]  kasan_save_alloc_info+0x40/0x58
[   24.324297]  __kasan_kmalloc+0xd4/0xd8
[   24.324340]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.324385]  kasan_atomics+0xb8/0x2e0
[   24.325693]  kunit_try_run_case+0x170/0x3f0
[   24.326075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.326502]  kthread+0x328/0x630
[   24.326633]  ret_from_fork+0x10/0x20
[   24.326694] 
[   24.327153] The buggy address belongs to the object at fff00000c63eb100
[   24.327153]  which belongs to the cache kmalloc-64 of size 64
[   24.327512] The buggy address is located 0 bytes to the right of
[   24.327512]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.327656] 
[   24.327685] The buggy address belongs to the physical page:
[   24.327721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.327779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.327834] page_type: f5(slab)
[   24.327881] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.329181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.329256] page dumped because: kasan: bad access detected
[   24.329299] 
[   24.329323] Memory state around the buggy address:
[   24.329365]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.330388]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.330513] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.330563]                                      ^
[   24.330605]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.330953]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.331216] ==================================================================
[   24.267062] ==================================================================
[   24.267139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   24.267211] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.268554] 
[   24.268761] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.269057] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.269098] Hardware name: linux,dummy-virt (DT)
[   24.269137] Call trace:
[   24.269168]  show_stack+0x20/0x38 (C)
[   24.269236]  dump_stack_lvl+0x8c/0xd0
[   24.269295]  print_report+0x118/0x608
[   24.269350]  kasan_report+0xdc/0x128
[   24.269404]  kasan_check_range+0x100/0x1a8
[   24.269461]  __kasan_check_write+0x20/0x30
[   24.269514]  kasan_atomics_helper+0x16d0/0x4858
[   24.269570]  kasan_atomics+0x198/0x2e0
[   24.269620]  kunit_try_run_case+0x170/0x3f0
[   24.269677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.269735]  kthread+0x328/0x630
[   24.269783]  ret_from_fork+0x10/0x20
[   24.269840] 
[   24.269865] Allocated by task 275:
[   24.269900]  kasan_save_stack+0x3c/0x68
[   24.269950]  kasan_save_track+0x20/0x40
[   24.270008]  kasan_save_alloc_info+0x40/0x58
[   24.273391]  __kasan_kmalloc+0xd4/0xd8
[   24.273496]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.273556]  kasan_atomics+0xb8/0x2e0
[   24.274063]  kunit_try_run_case+0x170/0x3f0
[   24.274366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.274455]  kthread+0x328/0x630
[   24.274495]  ret_from_fork+0x10/0x20
[   24.274539] 
[   24.274569] The buggy address belongs to the object at fff00000c63eb100
[   24.274569]  which belongs to the cache kmalloc-64 of size 64
[   24.275237] The buggy address is located 0 bytes to the right of
[   24.275237]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.275359] 
[   24.275387] The buggy address belongs to the physical page:
[   24.275425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.275483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.275540] page_type: f5(slab)
[   24.275587] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.275645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.275692] page dumped because: kasan: bad access detected
[   24.275730] 
[   24.275752] Memory state around the buggy address:
[   24.277153]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.277374]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.277670] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.277918]                                      ^
[   24.277966]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.278026]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.278538] ==================================================================
[   24.307182] ==================================================================
[   24.307259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   24.307328] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.307383] 
[   24.307428] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.307525] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.307557] Hardware name: linux,dummy-virt (DT)
[   24.307595] Call trace:
[   24.307622]  show_stack+0x20/0x38 (C)
[   24.307680]  dump_stack_lvl+0x8c/0xd0
[   24.307734]  print_report+0x118/0x608
[   24.307786]  kasan_report+0xdc/0x128
[   24.307837]  __asan_report_load8_noabort+0x20/0x30
[   24.307893]  kasan_atomics_helper+0x3e20/0x4858
[   24.307946]  kasan_atomics+0x198/0x2e0
[   24.307999]  kunit_try_run_case+0x170/0x3f0
[   24.308074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.308137]  kthread+0x328/0x630
[   24.308187]  ret_from_fork+0x10/0x20
[   24.308244] 
[   24.308267] Allocated by task 275:
[   24.308302]  kasan_save_stack+0x3c/0x68
[   24.308353]  kasan_save_track+0x20/0x40
[   24.308398]  kasan_save_alloc_info+0x40/0x58
[   24.308446]  __kasan_kmalloc+0xd4/0xd8
[   24.308489]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.308544]  kasan_atomics+0xb8/0x2e0
[   24.308593]  kunit_try_run_case+0x170/0x3f0
[   24.308637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.308688]  kthread+0x328/0x630
[   24.308726]  ret_from_fork+0x10/0x20
[   24.308768] 
[   24.308793] The buggy address belongs to the object at fff00000c63eb100
[   24.308793]  which belongs to the cache kmalloc-64 of size 64
[   24.308862] The buggy address is located 0 bytes to the right of
[   24.308862]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.308933] 
[   24.308958] The buggy address belongs to the physical page:
[   24.308992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.314004] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.314432] page_type: f5(slab)
[   24.314746] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.314807] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.314855] page dumped because: kasan: bad access detected
[   24.314893] 
[   24.314914] Memory state around the buggy address:
[   24.314952]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.315001]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.315068] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.315967]                                      ^
[   24.316094]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.316254]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.316300] ==================================================================
[   23.750966] ==================================================================
[   23.751104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   23.751479] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.752313] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.753591]  dump_stack_lvl+0x8c/0xd0
[   23.754703]  kasan_atomics+0x198/0x2e0
[   23.756292] 
[   23.756495]  kasan_save_track+0x20/0x40
[   23.756911]  kasan_atomics+0xb8/0x2e0
[   23.757114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.757313]  ret_from_fork+0x10/0x20
[   23.759077] The buggy address is located 0 bytes to the right of
[   23.759077]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.762695]                                      ^
[   23.762869]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.763176]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.765377] ==================================================================
[   24.134955] ==================================================================
[   24.135074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   24.135187] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.135308] 
[   24.135436] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.135691] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.135802] Hardware name: linux,dummy-virt (DT)
[   24.136005] Call trace:
[   24.136262]  show_stack+0x20/0x38 (C)
[   24.136626]  dump_stack_lvl+0x8c/0xd0
[   24.136793]  print_report+0x118/0x608
[   24.136946]  kasan_report+0xdc/0x128
[   24.137112]  kasan_check_range+0x100/0x1a8
[   24.137278]  __kasan_check_write+0x20/0x30
[   24.137394]  kasan_atomics_helper+0x1190/0x4858
[   24.137513]  kasan_atomics+0x198/0x2e0
[   24.137728]  kunit_try_run_case+0x170/0x3f0
[   24.138007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.138314]  kthread+0x328/0x630
[   24.138430]  ret_from_fork+0x10/0x20
[   24.138545] 
[   24.138595] Allocated by task 275:
[   24.138670]  kasan_save_stack+0x3c/0x68
[   24.138779]  kasan_save_track+0x20/0x40
[   24.138874]  kasan_save_alloc_info+0x40/0x58
[   24.138962]  __kasan_kmalloc+0xd4/0xd8
[   24.139051]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.139142]  kasan_atomics+0xb8/0x2e0
[   24.139226]  kunit_try_run_case+0x170/0x3f0
[   24.139318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.139431]  kthread+0x328/0x630
[   24.139512]  ret_from_fork+0x10/0x20
[   24.139599] 
[   24.139654] The buggy address belongs to the object at fff00000c63eb100
[   24.139654]  which belongs to the cache kmalloc-64 of size 64
[   24.139793] The buggy address is located 0 bytes to the right of
[   24.139793]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.139952] 
[   24.140011] The buggy address belongs to the physical page:
[   24.140360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.140959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.141146] page_type: f5(slab)
[   24.141256] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.141675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.141818] page dumped because: kasan: bad access detected
[   24.141904] 
[   24.141952] Memory state around the buggy address:
[   24.142046]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.142156]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.142267] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.142369]                                      ^
[   24.142452]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.142546]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.142646] ==================================================================
[   23.992947] ==================================================================
[   23.993064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   23.993185] Read of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.993300] 
[   23.993382] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.993590] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.993665] Hardware name: linux,dummy-virt (DT)
[   23.993743] Call trace:
[   23.993797]  show_stack+0x20/0x38 (C)
[   23.993912]  dump_stack_lvl+0x8c/0xd0
[   23.994027]  print_report+0x118/0x608
[   23.994172]  kasan_report+0xdc/0x128
[   23.994276]  __asan_report_load4_noabort+0x20/0x30
[   23.994722]  kasan_atomics_helper+0x3e04/0x4858
[   23.994878]  kasan_atomics+0x198/0x2e0
[   23.994980]  kunit_try_run_case+0x170/0x3f0
[   23.995104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.995238]  kthread+0x328/0x630
[   23.995373]  ret_from_fork+0x10/0x20
[   23.995515] 
[   23.995577] Allocated by task 275:
[   23.995681]  kasan_save_stack+0x3c/0x68
[   23.995787]  kasan_save_track+0x20/0x40
[   23.995910]  kasan_save_alloc_info+0x40/0x58
[   23.996047]  __kasan_kmalloc+0xd4/0xd8
[   23.996135]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.996239]  kasan_atomics+0xb8/0x2e0
[   23.996327]  kunit_try_run_case+0x170/0x3f0
[   23.996417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.996576]  kthread+0x328/0x630
[   23.996708]  ret_from_fork+0x10/0x20
[   23.996826] 
[   23.996897] The buggy address belongs to the object at fff00000c63eb100
[   23.996897]  which belongs to the cache kmalloc-64 of size 64
[   23.997106] The buggy address is located 0 bytes to the right of
[   23.997106]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.997531] 
[   23.997632] The buggy address belongs to the physical page:
[   23.997958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.998148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.998300] page_type: f5(slab)
[   23.998399] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.998537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.998680] page dumped because: kasan: bad access detected
[   23.998782] 
[   23.998826] Memory state around the buggy address:
[   23.998919]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.999037]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.999148] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.999254]                                      ^
[   23.999349]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.999435]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.999534] ==================================================================
[   24.028947] ==================================================================
[   24.029136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   24.029260] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.029609] 
[   24.029838] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.030600] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.030977] Hardware name: linux,dummy-virt (DT)
[   24.031342] Call trace:
[   24.031537]  show_stack+0x20/0x38 (C)
[   24.031892]  dump_stack_lvl+0x8c/0xd0
[   24.032418]  print_report+0x118/0x608
[   24.032827]  kasan_report+0xdc/0x128
[   24.033290]  __asan_report_store8_noabort+0x20/0x30
[   24.033684]  kasan_atomics_helper+0x3e5c/0x4858
[   24.034268]  kasan_atomics+0x198/0x2e0
[   24.034567]  kunit_try_run_case+0x170/0x3f0
[   24.034784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.035416]  kthread+0x328/0x630
[   24.035603]  ret_from_fork+0x10/0x20
[   24.036250] 
[   24.036409] Allocated by task 275:
[   24.036706]  kasan_save_stack+0x3c/0x68
[   24.037216]  kasan_save_track+0x20/0x40
[   24.037511]  kasan_save_alloc_info+0x40/0x58
[   24.038084]  __kasan_kmalloc+0xd4/0xd8
[   24.038415]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.038850]  kasan_atomics+0xb8/0x2e0
[   24.039056]  kunit_try_run_case+0x170/0x3f0
[   24.039169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.039279]  kthread+0x328/0x630
[   24.039364]  ret_from_fork+0x10/0x20
[   24.039461] 
[   24.040231] The buggy address belongs to the object at fff00000c63eb100
[   24.040231]  which belongs to the cache kmalloc-64 of size 64
[   24.041318] The buggy address is located 0 bytes to the right of
[   24.041318]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.041710] 
[   24.041783] The buggy address belongs to the physical page:
[   24.041955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.042296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.042437] page_type: f5(slab)
[   24.042842] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.043298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.043813] page dumped because: kasan: bad access detected
[   24.043921] 
[   24.044095] Memory state around the buggy address:
[   24.044194]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.044789]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.044922] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.045110]                                      ^
[   24.045237]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.045349]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.045677] ==================================================================
[   24.056578] ==================================================================
[   24.056701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   24.056819] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.056945] 
[   24.057040] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.057269] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.057348] Hardware name: linux,dummy-virt (DT)
[   24.057436] Call trace:
[   24.057496]  show_stack+0x20/0x38 (C)
[   24.057620]  dump_stack_lvl+0x8c/0xd0
[   24.057742]  print_report+0x118/0x608
[   24.057864]  kasan_report+0xdc/0x128
[   24.057977]  kasan_check_range+0x100/0x1a8
[   24.059587]  __kasan_check_write+0x20/0x30
[   24.059800]  kasan_atomics_helper+0xf20/0x4858
[   24.060137]  kasan_atomics+0x198/0x2e0
[   24.060341]  kunit_try_run_case+0x170/0x3f0
[   24.060474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.060626]  kthread+0x328/0x630
[   24.060736]  ret_from_fork+0x10/0x20
[   24.060915] 
[   24.061007] Allocated by task 275:
[   24.061166]  kasan_save_stack+0x3c/0x68
[   24.061550]  kasan_save_track+0x20/0x40
[   24.061678]  kasan_save_alloc_info+0x40/0x58
[   24.061879]  __kasan_kmalloc+0xd4/0xd8
[   24.062172]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.062296]  kasan_atomics+0xb8/0x2e0
[   24.062433]  kunit_try_run_case+0x170/0x3f0
[   24.062774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.062927]  kthread+0x328/0x630
[   24.063075]  ret_from_fork+0x10/0x20
[   24.063201] 
[   24.063288] The buggy address belongs to the object at fff00000c63eb100
[   24.063288]  which belongs to the cache kmalloc-64 of size 64
[   24.063638] The buggy address is located 0 bytes to the right of
[   24.063638]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.063828] 
[   24.063882] The buggy address belongs to the physical page:
[   24.063924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.063990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.064099] page_type: f5(slab)
[   24.064200] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.064368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.064622] page dumped because: kasan: bad access detected
[   24.064713] 
[   24.064775] Memory state around the buggy address:
[   24.064864]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.065278]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.065420] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.065567]                                      ^
[   24.065651]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.065751]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.066146] ==================================================================
[   23.858731] ==================================================================
[   23.859107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   23.859488] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.859624] 
[   23.859706] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.859915] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.859997] Hardware name: linux,dummy-virt (DT)
[   23.860089] Call trace:
[   23.860150]  show_stack+0x20/0x38 (C)
[   23.860272]  dump_stack_lvl+0x8c/0xd0
[   23.860398]  print_report+0x118/0x608
[   23.860520]  kasan_report+0xdc/0x128
[   23.860660]  kasan_check_range+0x100/0x1a8
[   23.860788]  __kasan_check_write+0x20/0x30
[   23.860908]  kasan_atomics_helper+0xad4/0x4858
[   23.862793]  kasan_atomics+0x198/0x2e0
[   23.863764]  kunit_try_run_case+0x170/0x3f0
[   23.863996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.864164]  kthread+0x328/0x630
[   23.864269]  ret_from_fork+0x10/0x20
[   23.864407] 
[   23.864456] Allocated by task 275:
[   23.864524]  kasan_save_stack+0x3c/0x68
[   23.864644]  kasan_save_track+0x20/0x40
[   23.864747]  kasan_save_alloc_info+0x40/0x58
[   23.864874]  __kasan_kmalloc+0xd4/0xd8
[   23.864988]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.865111]  kasan_atomics+0xb8/0x2e0
[   23.865223]  kunit_try_run_case+0x170/0x3f0
[   23.865328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.865441]  kthread+0x328/0x630
[   23.865525]  ret_from_fork+0x10/0x20
[   23.865618] 
[   23.865682] The buggy address belongs to the object at fff00000c63eb100
[   23.865682]  which belongs to the cache kmalloc-64 of size 64
[   23.865824] The buggy address is located 0 bytes to the right of
[   23.865824]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.865974] 
[   23.866222] The buggy address belongs to the physical page:
[   23.866478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.867099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.867532] page_type: f5(slab)
[   23.867636] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.868071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.868364] page dumped because: kasan: bad access detected
[   23.868606] 
[   23.868668] Memory state around the buggy address:
[   23.868761]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.869196]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.869380] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.869475]                                      ^
[   23.869933]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.870102]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.870376] ==================================================================
[   24.165101] ==================================================================
[   24.165218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   24.165339] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.165464] 
[   24.165556] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.165783] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.165861] Hardware name: linux,dummy-virt (DT)
[   24.165943] Call trace:
[   24.166006]  show_stack+0x20/0x38 (C)
[   24.166139]  dump_stack_lvl+0x8c/0xd0
[   24.166251]  print_report+0x118/0x608
[   24.166414]  kasan_report+0xdc/0x128
[   24.166545]  kasan_check_range+0x100/0x1a8
[   24.166676]  __kasan_check_write+0x20/0x30
[   24.166805]  kasan_atomics_helper+0x12d8/0x4858
[   24.166961]  kasan_atomics+0x198/0x2e0
[   24.167175]  kunit_try_run_case+0x170/0x3f0
[   24.167307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.167459]  kthread+0x328/0x630
[   24.167560]  ret_from_fork+0x10/0x20
[   24.167709] 
[   24.167776] Allocated by task 275:
[   24.167848]  kasan_save_stack+0x3c/0x68
[   24.167933]  kasan_save_track+0x20/0x40
[   24.168036]  kasan_save_alloc_info+0x40/0x58
[   24.168127]  __kasan_kmalloc+0xd4/0xd8
[   24.168212]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.168365]  kasan_atomics+0xb8/0x2e0
[   24.168491]  kunit_try_run_case+0x170/0x3f0
[   24.168603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.168723]  kthread+0x328/0x630
[   24.168844]  ret_from_fork+0x10/0x20
[   24.168929] 
[   24.168984] The buggy address belongs to the object at fff00000c63eb100
[   24.168984]  which belongs to the cache kmalloc-64 of size 64
[   24.169168] The buggy address is located 0 bytes to the right of
[   24.169168]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.169377] 
[   24.169452] The buggy address belongs to the physical page:
[   24.169554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.169728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.169894] page_type: f5(slab)
[   24.169988] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.170112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.170259] page dumped because: kasan: bad access detected
[   24.170342] 
[   24.170406] Memory state around the buggy address:
[   24.170497]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.170618]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.170729] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.170862]                                      ^
[   24.171010]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.171151]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.171277] ==================================================================
[   24.143422] ==================================================================
[   24.143551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   24.143668] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.143791] 
[   24.143877] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.144094] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.144177] Hardware name: linux,dummy-virt (DT)
[   24.144262] Call trace:
[   24.144325]  show_stack+0x20/0x38 (C)
[   24.144449]  dump_stack_lvl+0x8c/0xd0
[   24.144585]  print_report+0x118/0x608
[   24.144715]  kasan_report+0xdc/0x128
[   24.144835]  kasan_check_range+0x100/0x1a8
[   24.144961]  __kasan_check_write+0x20/0x30
[   24.145089]  kasan_atomics_helper+0x11f8/0x4858
[   24.145206]  kasan_atomics+0x198/0x2e0
[   24.145333]  kunit_try_run_case+0x170/0x3f0
[   24.145460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.145993]  kthread+0x328/0x630
[   24.146490]  ret_from_fork+0x10/0x20
[   24.146804] 
[   24.146879] Allocated by task 275:
[   24.146955]  kasan_save_stack+0x3c/0x68
[   24.147071]  kasan_save_track+0x20/0x40
[   24.147169]  kasan_save_alloc_info+0x40/0x58
[   24.147501]  __kasan_kmalloc+0xd4/0xd8
[   24.147603]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.147725]  kasan_atomics+0xb8/0x2e0
[   24.147923]  kunit_try_run_case+0x170/0x3f0
[   24.148103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.148273]  kthread+0x328/0x630
[   24.148400]  ret_from_fork+0x10/0x20
[   24.148537] 
[   24.148631] The buggy address belongs to the object at fff00000c63eb100
[   24.148631]  which belongs to the cache kmalloc-64 of size 64
[   24.148841] The buggy address is located 0 bytes to the right of
[   24.148841]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.149014] 
[   24.149093] The buggy address belongs to the physical page:
[   24.149212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.149344] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.149476] page_type: f5(slab)
[   24.149592] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.149725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.149875] page dumped because: kasan: bad access detected
[   24.149960] 
[   24.150069] Memory state around the buggy address:
[   24.150146]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.151248]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.151405] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.151587]                                      ^
[   24.151661]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.151748]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.151838] ==================================================================
[   24.184783] ==================================================================
[   24.184894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   24.185011] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.185150] 
[   24.185236] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.185461] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.185540] Hardware name: linux,dummy-virt (DT)
[   24.185620] Call trace:
[   24.185680]  show_stack+0x20/0x38 (C)
[   24.185804]  dump_stack_lvl+0x8c/0xd0
[   24.185926]  print_report+0x118/0x608
[   24.186063]  kasan_report+0xdc/0x128
[   24.186169]  kasan_check_range+0x100/0x1a8
[   24.186369]  __kasan_check_write+0x20/0x30
[   24.186500]  kasan_atomics_helper+0x1414/0x4858
[   24.186631]  kasan_atomics+0x198/0x2e0
[   24.186737]  kunit_try_run_case+0x170/0x3f0
[   24.186870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.186989]  kthread+0x328/0x630
[   24.187193]  ret_from_fork+0x10/0x20
[   24.187335] 
[   24.187381] Allocated by task 275:
[   24.187440]  kasan_save_stack+0x3c/0x68
[   24.187558]  kasan_save_track+0x20/0x40
[   24.187655]  kasan_save_alloc_info+0x40/0x58
[   24.187752]  __kasan_kmalloc+0xd4/0xd8
[   24.187866]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.187967]  kasan_atomics+0xb8/0x2e0
[   24.188062]  kunit_try_run_case+0x170/0x3f0
[   24.188163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.188279]  kthread+0x328/0x630
[   24.188384]  ret_from_fork+0x10/0x20
[   24.188489] 
[   24.188553] The buggy address belongs to the object at fff00000c63eb100
[   24.188553]  which belongs to the cache kmalloc-64 of size 64
[   24.188723] The buggy address is located 0 bytes to the right of
[   24.188723]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.188922] 
[   24.188978] The buggy address belongs to the physical page:
[   24.189067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.189201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.189325] page_type: f5(slab)
[   24.189416] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.189541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.189652] page dumped because: kasan: bad access detected
[   24.189741] 
[   24.189789] Memory state around the buggy address:
[   24.189873]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.189987]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.190126] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.190224]                                      ^
[   24.190347]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.190472]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.190575] ==================================================================
[   23.978982] ==================================================================
[   23.979185] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   23.979336] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.979470] 
[   23.979854] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.980559] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.981012] Hardware name: linux,dummy-virt (DT)
[   23.981136] Call trace:
[   23.981222]  show_stack+0x20/0x38 (C)
[   23.981362]  dump_stack_lvl+0x8c/0xd0
[   23.981493]  print_report+0x118/0x608
[   23.982405]  kasan_report+0xdc/0x128
[   23.982686]  kasan_check_range+0x100/0x1a8
[   23.983232]  __kasan_check_write+0x20/0x30
[   23.983399]  kasan_atomics_helper+0xd3c/0x4858
[   23.983856]  kasan_atomics+0x198/0x2e0
[   23.984229]  kunit_try_run_case+0x170/0x3f0
[   23.984380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.985075]  kthread+0x328/0x630
[   23.985446]  ret_from_fork+0x10/0x20
[   23.985589] 
[   23.985637] Allocated by task 275:
[   23.986141]  kasan_save_stack+0x3c/0x68
[   23.986298]  kasan_save_track+0x20/0x40
[   23.986398]  kasan_save_alloc_info+0x40/0x58
[   23.986491]  __kasan_kmalloc+0xd4/0xd8
[   23.986569]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.986647]  kasan_atomics+0xb8/0x2e0
[   23.986724]  kunit_try_run_case+0x170/0x3f0
[   23.987579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.987729]  kthread+0x328/0x630
[   23.987813]  ret_from_fork+0x10/0x20
[   23.988159] 
[   23.988216] The buggy address belongs to the object at fff00000c63eb100
[   23.988216]  which belongs to the cache kmalloc-64 of size 64
[   23.988805] The buggy address is located 0 bytes to the right of
[   23.988805]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.989306] 
[   23.989438] The buggy address belongs to the physical page:
[   23.989524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.989745] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.989865] page_type: f5(slab)
[   23.990665] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.990833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.991026] page dumped because: kasan: bad access detected
[   23.991154] 
[   23.991215] Memory state around the buggy address:
[   23.991293]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.991388]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.991481] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.991569]                                      ^
[   23.992268]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.992383]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.992436] ==================================================================
[   24.020936] ==================================================================
[   24.021292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   24.021431] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.021564] 
[   24.021652] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.021870] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.021955] Hardware name: linux,dummy-virt (DT)
[   24.022054] Call trace:
[   24.022393]  show_stack+0x20/0x38 (C)
[   24.022567]  dump_stack_lvl+0x8c/0xd0
[   24.022698]  print_report+0x118/0x608
[   24.022824]  kasan_report+0xdc/0x128
[   24.022952]  kasan_check_range+0x100/0x1a8
[   24.023075]  __kasan_check_write+0x20/0x30
[   24.023178]  kasan_atomics_helper+0xe44/0x4858
[   24.023297]  kasan_atomics+0x198/0x2e0
[   24.023406]  kunit_try_run_case+0x170/0x3f0
[   24.023524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.023654]  kthread+0x328/0x630
[   24.023756]  ret_from_fork+0x10/0x20
[   24.023873] 
[   24.023928] Allocated by task 275:
[   24.023999]  kasan_save_stack+0x3c/0x68
[   24.024115]  kasan_save_track+0x20/0x40
[   24.024216]  kasan_save_alloc_info+0x40/0x58
[   24.024322]  __kasan_kmalloc+0xd4/0xd8
[   24.024419]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.024524]  kasan_atomics+0xb8/0x2e0
[   24.024632]  kunit_try_run_case+0x170/0x3f0
[   24.024730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.024840]  kthread+0x328/0x630
[   24.024922]  ret_from_fork+0x10/0x20
[   24.025010] 
[   24.025070] The buggy address belongs to the object at fff00000c63eb100
[   24.025070]  which belongs to the cache kmalloc-64 of size 64
[   24.025208] The buggy address is located 0 bytes to the right of
[   24.025208]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.026143] 
[   24.026233] The buggy address belongs to the physical page:
[   24.026312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.026432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.026776] page_type: f5(slab)
[   24.026878] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.026994] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.027103] page dumped because: kasan: bad access detected
[   24.027376] 
[   24.027424] Memory state around the buggy address:
[   24.027503]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.027606]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.027714] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.027811]                                      ^
[   24.027895]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.028004]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.028107] ==================================================================
[   23.818953] ==================================================================
[   23.819120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   23.819252] Read of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.819393] 
[   23.819495] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.819673] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.819738] Hardware name: linux,dummy-virt (DT)
[   23.819799] Call trace:
[   23.819845]  show_stack+0x20/0x38 (C)
[   23.819953]  dump_stack_lvl+0x8c/0xd0
[   23.820072]  print_report+0x118/0x608
[   23.820215]  kasan_report+0xdc/0x128
[   23.820344]  __asan_report_load4_noabort+0x20/0x30
[   23.820485]  kasan_atomics_helper+0x42d8/0x4858
[   23.820644]  kasan_atomics+0x198/0x2e0
[   23.820777]  kunit_try_run_case+0x170/0x3f0
[   23.820886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.820998]  kthread+0x328/0x630
[   23.821108]  ret_from_fork+0x10/0x20
[   23.821220] 
[   23.821283] Allocated by task 275:
[   23.821362]  kasan_save_stack+0x3c/0x68
[   23.821485]  kasan_save_track+0x20/0x40
[   23.821579]  kasan_save_alloc_info+0x40/0x58
[   23.821668]  __kasan_kmalloc+0xd4/0xd8
[   23.821760]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.821850]  kasan_atomics+0xb8/0x2e0
[   23.821926]  kunit_try_run_case+0x170/0x3f0
[   23.822025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.822141]  kthread+0x328/0x630
[   23.822219]  ret_from_fork+0x10/0x20
[   23.822303] 
[   23.822350] The buggy address belongs to the object at fff00000c63eb100
[   23.822350]  which belongs to the cache kmalloc-64 of size 64
[   23.822490] The buggy address is located 0 bytes to the right of
[   23.822490]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.822672] 
[   23.822728] The buggy address belongs to the physical page:
[   23.822796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.822914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.823015] page_type: f5(slab)
[   23.823114] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.823244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.823388] page dumped because: kasan: bad access detected
[   23.823544] 
[   23.823593] Memory state around the buggy address:
[   23.823690]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.823833]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.823922] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.824000]                                      ^
[   23.824106]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.824202]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.824280] ==================================================================
[   23.796407] ==================================================================
[   23.796537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   23.797208] Call trace:
[   23.798582]  kasan_atomics_helper+0x7cc/0x4858
[   23.799304] Allocated by task 275:
[   23.800593]  kthread+0x328/0x630
[   23.801384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.801505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.801834] page_type: f5(slab)
[   23.801924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.802135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.802235] page dumped because: kasan: bad access detected
[   23.802324] 
[   23.802370] Memory state around the buggy address:
[   23.802501]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.802944] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.803594]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.803998] ==================================================================
[   23.846438] ==================================================================
[   23.846560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   23.846773] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.846955] 
[   23.847050] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.847277] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.847351] Hardware name: linux,dummy-virt (DT)
[   23.847425] Call trace:
[   23.847476]  show_stack+0x20/0x38 (C)
[   23.847567]  dump_stack_lvl+0x8c/0xd0
[   23.847662]  print_report+0x118/0x608
[   23.847764]  kasan_report+0xdc/0x128
[   23.847875]  kasan_check_range+0x100/0x1a8
[   23.848455]  __kasan_check_write+0x20/0x30
[   23.848982]  kasan_atomics_helper+0xa6c/0x4858
[   23.849475]  kasan_atomics+0x198/0x2e0
[   23.849618]  kunit_try_run_case+0x170/0x3f0
[   23.849739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.849992]  kthread+0x328/0x630
[   23.851002]  ret_from_fork+0x10/0x20
[   23.851183] 
[   23.851238] Allocated by task 275:
[   23.851381]  kasan_save_stack+0x3c/0x68
[   23.851482]  kasan_save_track+0x20/0x40
[   23.851576]  kasan_save_alloc_info+0x40/0x58
[   23.851664]  __kasan_kmalloc+0xd4/0xd8
[   23.851750]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.852295]  kasan_atomics+0xb8/0x2e0
[   23.852397]  kunit_try_run_case+0x170/0x3f0
[   23.852897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.853014]  kthread+0x328/0x630
[   23.853104]  ret_from_fork+0x10/0x20
[   23.853500] 
[   23.853553] The buggy address belongs to the object at fff00000c63eb100
[   23.853553]  which belongs to the cache kmalloc-64 of size 64
[   23.854108] The buggy address is located 0 bytes to the right of
[   23.854108]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.854275] 
[   23.854326] The buggy address belongs to the physical page:
[   23.854399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.854505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.854603] page_type: f5(slab)
[   23.854685] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.855251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.855499] page dumped because: kasan: bad access detected
[   23.855928] 
[   23.855985] Memory state around the buggy address:
[   23.856184]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.856385]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.856631] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.856740]                                      ^
[   23.856829]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.856939]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.857443] ==================================================================
[   24.191205] ==================================================================
[   24.191319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   24.191432] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.191548] 
[   24.191624] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.191835] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.191907] Hardware name: linux,dummy-virt (DT)
[   24.191984] Call trace:
[   24.192053]  show_stack+0x20/0x38 (C)
[   24.192175]  dump_stack_lvl+0x8c/0xd0
[   24.192306]  print_report+0x118/0x608
[   24.192472]  kasan_report+0xdc/0x128
[   24.192654]  kasan_check_range+0x100/0x1a8
[   24.192820]  __kasan_check_write+0x20/0x30
[   24.192960]  kasan_atomics_helper+0x147c/0x4858
[   24.193082]  kasan_atomics+0x198/0x2e0
[   24.193192]  kunit_try_run_case+0x170/0x3f0
[   24.193356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.193520]  kthread+0x328/0x630
[   24.193661]  ret_from_fork+0x10/0x20
[   24.193781] 
[   24.193831] Allocated by task 275:
[   24.193906]  kasan_save_stack+0x3c/0x68
[   24.194063]  kasan_save_track+0x20/0x40
[   24.194166]  kasan_save_alloc_info+0x40/0x58
[   24.194279]  __kasan_kmalloc+0xd4/0xd8
[   24.194386]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.194498]  kasan_atomics+0xb8/0x2e0
[   24.194594]  kunit_try_run_case+0x170/0x3f0
[   24.194798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.195094]  kthread+0x328/0x630
[   24.195409]  ret_from_fork+0x10/0x20
[   24.195588] 
[   24.195687] The buggy address belongs to the object at fff00000c63eb100
[   24.195687]  which belongs to the cache kmalloc-64 of size 64
[   24.195836] The buggy address is located 0 bytes to the right of
[   24.195836]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.195997] 
[   24.196058] The buggy address belongs to the physical page:
[   24.196133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.196557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.196709] page_type: f5(slab)
[   24.197104] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.197519] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.197672] page dumped because: kasan: bad access detected
[   24.197771] 
[   24.197922] Memory state around the buggy address:
[   24.198093]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.198197]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.198276] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.198320]                                      ^
[   24.198360]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.198433]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.198518] ==================================================================
[   24.220781] ==================================================================
[   24.220937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   24.221044] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.221126] 
[   24.221388] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.221500] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.221537] Hardware name: linux,dummy-virt (DT)
[   24.221578] Call trace:
[   24.221609]  show_stack+0x20/0x38 (C)
[   24.222120]  dump_stack_lvl+0x8c/0xd0
[   24.222207]  print_report+0x118/0x608
[   24.222288]  kasan_report+0xdc/0x128
[   24.222418]  kasan_check_range+0x100/0x1a8
[   24.222480]  __kasan_check_write+0x20/0x30
[   24.222536]  kasan_atomics_helper+0x15b4/0x4858
[   24.223253]  kasan_atomics+0x198/0x2e0
[   24.224034]  kunit_try_run_case+0x170/0x3f0
[   24.224149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.224218]  kthread+0x328/0x630
[   24.224269]  ret_from_fork+0x10/0x20
[   24.224333] 
[   24.224358] Allocated by task 275:
[   24.224396]  kasan_save_stack+0x3c/0x68
[   24.224451]  kasan_save_track+0x20/0x40
[   24.224498]  kasan_save_alloc_info+0x40/0x58
[   24.224571]  __kasan_kmalloc+0xd4/0xd8
[   24.224621]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.224669]  kasan_atomics+0xb8/0x2e0
[   24.225689]  kunit_try_run_case+0x170/0x3f0
[   24.226052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.226171]  kthread+0x328/0x630
[   24.226345]  ret_from_fork+0x10/0x20
[   24.226434] 
[   24.226465] The buggy address belongs to the object at fff00000c63eb100
[   24.226465]  which belongs to the cache kmalloc-64 of size 64
[   24.226692] The buggy address is located 0 bytes to the right of
[   24.226692]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.226777] 
[   24.226930] The buggy address belongs to the physical page:
[   24.227001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.227800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.227964] page_type: f5(slab)
[   24.228016] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.228389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.228721] page dumped because: kasan: bad access detected
[   24.228776] 
[   24.228801] Memory state around the buggy address:
[   24.228995]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.229177]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.229230] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.229453]                                      ^
[   24.229504]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.229655]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.229705] ==================================================================
[   24.125068] ==================================================================
[   24.125229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   24.125373] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.125482] 
[   24.125570] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.125743] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.125807] Hardware name: linux,dummy-virt (DT)
[   24.125882] Call trace:
[   24.125940]  show_stack+0x20/0x38 (C)
[   24.126468]  dump_stack_lvl+0x8c/0xd0
[   24.126834]  print_report+0x118/0x608
[   24.127225]  kasan_report+0xdc/0x128
[   24.127530]  kasan_check_range+0x100/0x1a8
[   24.127677]  __kasan_check_write+0x20/0x30
[   24.127782]  kasan_atomics_helper+0x1128/0x4858
[   24.127913]  kasan_atomics+0x198/0x2e0
[   24.128043]  kunit_try_run_case+0x170/0x3f0
[   24.128172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.128306]  kthread+0x328/0x630
[   24.128409]  ret_from_fork+0x10/0x20
[   24.128542] 
[   24.128599] Allocated by task 275:
[   24.128675]  kasan_save_stack+0x3c/0x68
[   24.128774]  kasan_save_track+0x20/0x40
[   24.128867]  kasan_save_alloc_info+0x40/0x58
[   24.129783]  __kasan_kmalloc+0xd4/0xd8
[   24.129910]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.130012]  kasan_atomics+0xb8/0x2e0
[   24.130108]  kunit_try_run_case+0x170/0x3f0
[   24.130207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.130322]  kthread+0x328/0x630
[   24.130405]  ret_from_fork+0x10/0x20
[   24.130498] 
[   24.130557] The buggy address belongs to the object at fff00000c63eb100
[   24.130557]  which belongs to the cache kmalloc-64 of size 64
[   24.131196] The buggy address is located 0 bytes to the right of
[   24.131196]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.131368] 
[   24.131424] The buggy address belongs to the physical page:
[   24.131626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.131750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.132042] page_type: f5(slab)
[   24.132154] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.132290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.132399] page dumped because: kasan: bad access detected
[   24.132487] 
[   24.132572] Memory state around the buggy address:
[   24.132708]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.132825]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.132928] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.133034]                                      ^
[   24.133124]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.133252]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.133390] ==================================================================
[   24.230936] ==================================================================
[   24.231084] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   24.231223] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.231290] 
[   24.231372] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.231513] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.231566] Hardware name: linux,dummy-virt (DT)
[   24.231639] Call trace:
[   24.231676]  show_stack+0x20/0x38 (C)
[   24.231737]  dump_stack_lvl+0x8c/0xd0
[   24.231795]  print_report+0x118/0x608
[   24.231849]  kasan_report+0xdc/0x128
[   24.231903]  __asan_report_load8_noabort+0x20/0x30
[   24.231962]  kasan_atomics_helper+0x3db0/0x4858
[   24.232030]  kasan_atomics+0x198/0x2e0
[   24.232089]  kunit_try_run_case+0x170/0x3f0
[   24.232145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.232205]  kthread+0x328/0x630
[   24.232255]  ret_from_fork+0x10/0x20
[   24.232727] 
[   24.232913] Allocated by task 275:
[   24.233080]  kasan_save_stack+0x3c/0x68
[   24.233155]  kasan_save_track+0x20/0x40
[   24.233235]  kasan_save_alloc_info+0x40/0x58
[   24.233446]  __kasan_kmalloc+0xd4/0xd8
[   24.233635]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.233845]  kasan_atomics+0xb8/0x2e0
[   24.234064]  kunit_try_run_case+0x170/0x3f0
[   24.234568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.234628]  kthread+0x328/0x630
[   24.234668]  ret_from_fork+0x10/0x20
[   24.234709] 
[   24.234736] The buggy address belongs to the object at fff00000c63eb100
[   24.234736]  which belongs to the cache kmalloc-64 of size 64
[   24.234801] The buggy address is located 0 bytes to the right of
[   24.234801]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.235476] 
[   24.235550] The buggy address belongs to the physical page:
[   24.235599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.235664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.235721] page_type: f5(slab)
[   24.235768] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.235825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.235872] page dumped because: kasan: bad access detected
[   24.236228] 
[   24.236471] Memory state around the buggy address:
[   24.236523]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.236591]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.236721] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.236820]                                      ^
[   24.236935]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.237042]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.237091] ==================================================================
[   24.011859] ==================================================================
[   24.012004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   24.012172] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.012282] 
[   24.012363] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.012627] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.012733] Hardware name: linux,dummy-virt (DT)
[   24.012821] Call trace:
[   24.012892]  show_stack+0x20/0x38 (C)
[   24.013078]  dump_stack_lvl+0x8c/0xd0
[   24.013233]  print_report+0x118/0x608
[   24.013391]  kasan_report+0xdc/0x128
[   24.013542]  __asan_report_load8_noabort+0x20/0x30
[   24.013708]  kasan_atomics_helper+0x3f58/0x4858
[   24.013870]  kasan_atomics+0x198/0x2e0
[   24.013979]  kunit_try_run_case+0x170/0x3f0
[   24.014164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.014314]  kthread+0x328/0x630
[   24.014414]  ret_from_fork+0x10/0x20
[   24.014528] 
[   24.014581] Allocated by task 275:
[   24.014657]  kasan_save_stack+0x3c/0x68
[   24.014785]  kasan_save_track+0x20/0x40
[   24.014898]  kasan_save_alloc_info+0x40/0x58
[   24.015004]  __kasan_kmalloc+0xd4/0xd8
[   24.015110]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.015211]  kasan_atomics+0xb8/0x2e0
[   24.015281]  kunit_try_run_case+0x170/0x3f0
[   24.015370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.015470]  kthread+0x328/0x630
[   24.015527]  ret_from_fork+0x10/0x20
[   24.015602] 
[   24.015658] The buggy address belongs to the object at fff00000c63eb100
[   24.015658]  which belongs to the cache kmalloc-64 of size 64
[   24.015805] The buggy address is located 0 bytes to the right of
[   24.015805]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.015972] 
[   24.016059] The buggy address belongs to the physical page:
[   24.016149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.016288] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.016882] page_type: f5(slab)
[   24.017052] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.017232] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.017339] page dumped because: kasan: bad access detected
[   24.017432] 
[   24.017848] Memory state around the buggy address:
[   24.017951]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.018420]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.018595] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.018749]                                      ^
[   24.019256]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.019403]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.019576] ==================================================================
[   24.209305] ==================================================================
[   24.209667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   24.209814] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.209999] 
[   24.210130] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.210372] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.210450] Hardware name: linux,dummy-virt (DT)
[   24.210525] Call trace:
[   24.210573]  show_stack+0x20/0x38 (C)
[   24.210669]  dump_stack_lvl+0x8c/0xd0
[   24.210777]  print_report+0x118/0x608
[   24.210880]  kasan_report+0xdc/0x128
[   24.210994]  kasan_check_range+0x100/0x1a8
[   24.211126]  __kasan_check_write+0x20/0x30
[   24.211239]  kasan_atomics_helper+0x154c/0x4858
[   24.211357]  kasan_atomics+0x198/0x2e0
[   24.211542]  kunit_try_run_case+0x170/0x3f0
[   24.211659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.211792]  kthread+0x328/0x630
[   24.211893]  ret_from_fork+0x10/0x20
[   24.212011] 
[   24.212486] Allocated by task 275:
[   24.212701]  kasan_save_stack+0x3c/0x68
[   24.212961]  kasan_save_track+0x20/0x40
[   24.213306]  kasan_save_alloc_info+0x40/0x58
[   24.213440]  __kasan_kmalloc+0xd4/0xd8
[   24.213582]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.213689]  kasan_atomics+0xb8/0x2e0
[   24.214010]  kunit_try_run_case+0x170/0x3f0
[   24.214177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.214333]  kthread+0x328/0x630
[   24.214450]  ret_from_fork+0x10/0x20
[   24.214779] 
[   24.214841] The buggy address belongs to the object at fff00000c63eb100
[   24.214841]  which belongs to the cache kmalloc-64 of size 64
[   24.214992] The buggy address is located 0 bytes to the right of
[   24.214992]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.215171] 
[   24.215225] The buggy address belongs to the physical page:
[   24.215401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.215537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.216071] page_type: f5(slab)
[   24.216182] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.216634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.216751] page dumped because: kasan: bad access detected
[   24.217258] 
[   24.217328] Memory state around the buggy address:
[   24.217422]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.217531]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.217644] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.217744]                                      ^
[   24.218444]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.218580]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.218683] ==================================================================
[   24.000101] ==================================================================
[   24.000211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   24.000332] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.000453] 
[   24.000539] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.000834] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.000931] Hardware name: linux,dummy-virt (DT)
[   24.001040] Call trace:
[   24.001379]  show_stack+0x20/0x38 (C)
[   24.001686]  dump_stack_lvl+0x8c/0xd0
[   24.001815]  print_report+0x118/0x608
[   24.001935]  kasan_report+0xdc/0x128
[   24.002807]  kasan_check_range+0x100/0x1a8
[   24.002973]  __kasan_check_read+0x20/0x30
[   24.003088]  kasan_atomics_helper+0xdd4/0x4858
[   24.003204]  kasan_atomics+0x198/0x2e0
[   24.003537]  kunit_try_run_case+0x170/0x3f0
[   24.004152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.004293]  kthread+0x328/0x630
[   24.004701]  ret_from_fork+0x10/0x20
[   24.004998] 
[   24.005360] Allocated by task 275:
[   24.005725]  kasan_save_stack+0x3c/0x68
[   24.005847]  kasan_save_track+0x20/0x40
[   24.005949]  kasan_save_alloc_info+0x40/0x58
[   24.006053]  __kasan_kmalloc+0xd4/0xd8
[   24.006131]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.006219]  kasan_atomics+0xb8/0x2e0
[   24.006307]  kunit_try_run_case+0x170/0x3f0
[   24.006944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.007432]  kthread+0x328/0x630
[   24.007532]  ret_from_fork+0x10/0x20
[   24.007805] 
[   24.007878] The buggy address belongs to the object at fff00000c63eb100
[   24.007878]  which belongs to the cache kmalloc-64 of size 64
[   24.008170] The buggy address is located 0 bytes to the right of
[   24.008170]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.008316] 
[   24.008398] The buggy address belongs to the physical page:
[   24.008475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.008643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.008832] page_type: f5(slab)
[   24.008954] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.009096] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.009204] page dumped because: kasan: bad access detected
[   24.009286] 
[   24.009338] Memory state around the buggy address:
[   24.009420]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.009573]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.009683] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.009782]                                      ^
[   24.009907]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.010049]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.010156] ==================================================================
[   24.153442] ==================================================================
[   24.153869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   24.154205] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.154521] 
[   24.154625] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.154855] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.154931] Hardware name: linux,dummy-virt (DT)
[   24.155009] Call trace:
[   24.155592]  show_stack+0x20/0x38 (C)
[   24.155750]  dump_stack_lvl+0x8c/0xd0
[   24.155965]  print_report+0x118/0x608
[   24.156196]  kasan_report+0xdc/0x128
[   24.156602]  kasan_check_range+0x100/0x1a8
[   24.156810]  __kasan_check_write+0x20/0x30
[   24.157129]  kasan_atomics_helper+0x126c/0x4858
[   24.157322]  kasan_atomics+0x198/0x2e0
[   24.157439]  kunit_try_run_case+0x170/0x3f0
[   24.157631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.157781]  kthread+0x328/0x630
[   24.158154]  ret_from_fork+0x10/0x20
[   24.158302] 
[   24.158434] Allocated by task 275:
[   24.158616]  kasan_save_stack+0x3c/0x68
[   24.158726]  kasan_save_track+0x20/0x40
[   24.158817]  kasan_save_alloc_info+0x40/0x58
[   24.158908]  __kasan_kmalloc+0xd4/0xd8
[   24.158998]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.159109]  kasan_atomics+0xb8/0x2e0
[   24.159202]  kunit_try_run_case+0x170/0x3f0
[   24.159693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.159872]  kthread+0x328/0x630
[   24.159994]  ret_from_fork+0x10/0x20
[   24.160213] 
[   24.160362] The buggy address belongs to the object at fff00000c63eb100
[   24.160362]  which belongs to the cache kmalloc-64 of size 64
[   24.160716] The buggy address is located 0 bytes to the right of
[   24.160716]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.161096] 
[   24.161193] The buggy address belongs to the physical page:
[   24.161426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.161789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.161936] page_type: f5(slab)
[   24.162053] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.162185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.162291] page dumped because: kasan: bad access detected
[   24.162623] 
[   24.162711] Memory state around the buggy address:
[   24.162871]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.163344]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.163588] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.163786]                                      ^
[   24.163965]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.164251]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.164359] ==================================================================
[   23.626665] ==================================================================
[   23.627928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   23.628861] Call trace:
[   23.629883]  kunit_try_run_case+0x170/0x3f0
[   23.631092]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.631822] The buggy address is located 0 bytes to the right of
[   23.631822]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.633149]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.634572] Read of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.637084]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.641488]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.645318]  dump_stack_lvl+0x8c/0xd0
[   23.646687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.650676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.657106]  kasan_check_range+0x100/0x1a8
[   23.659364]  kasan_save_stack+0x3c/0x68
[   23.661668] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.667037] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.673179]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.676375] page dumped because: kasan: bad access detected
[   23.680830] 
[   23.681663]  dump_stack_lvl+0x8c/0xd0
[   23.684392]  kasan_save_stack+0x3c/0x68
[   23.687127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.691013] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   23.692715]  kasan_atomics_helper+0x414/0x4858
[   23.694106]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.694374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.694624] 
[   23.695651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.698604]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.702283]  kasan_report+0xdc/0x128
[   23.703501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.704463]  __kasan_kmalloc+0xd4/0xd8
[   23.705685] 
[   23.706408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.707028] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.711308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   23.712789]  dump_stack_lvl+0x8c/0xd0
[   23.713667]  kunit_try_run_case+0x170/0x3f0
[   23.713781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.713910]  kthread+0x328/0x630
[   23.714767]  kasan_save_track+0x20/0x40
[   23.716473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.716843]  kthread+0x328/0x630
[   23.717486]  ret_from_fork+0x10/0x20
[   23.718777] 
[   23.721371] page_type: f5(slab)
[   23.722569] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.724608]                                      ^
[   23.729094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   23.729760] Hardware name: linux,dummy-virt (DT)
[   23.733683]  kasan_atomics+0x198/0x2e0
[   23.735065]  kasan_save_track+0x20/0x40
[   23.735414]  kasan_atomics+0xb8/0x2e0
[   23.736240] 
[   23.736292] The buggy address belongs to the physical page:
[   23.736783] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.737530]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.739450] ==================================================================
[   24.074641] ==================================================================
[   24.074736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   24.074831] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275
[   24.074925] 
[   24.074989] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   24.075220] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.075334] Hardware name: linux,dummy-virt (DT)
[   24.075426] Call trace:
[   24.075560]  show_stack+0x20/0x38 (C)
[   24.076886]  dump_stack_lvl+0x8c/0xd0
[   24.077129]  print_report+0x118/0x608
[   24.077698]  kasan_report+0xdc/0x128
[   24.078257]  kasan_check_range+0x100/0x1a8
[   24.078873]  __kasan_check_write+0x20/0x30
[   24.079007]  kasan_atomics_helper+0xff0/0x4858
[   24.079123]  kasan_atomics+0x198/0x2e0
[   24.079220]  kunit_try_run_case+0x170/0x3f0
[   24.079331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.079585]  kthread+0x328/0x630
[   24.079783]  ret_from_fork+0x10/0x20
[   24.080994] 
[   24.081087] Allocated by task 275:
[   24.081174]  kasan_save_stack+0x3c/0x68
[   24.081286]  kasan_save_track+0x20/0x40
[   24.081380]  kasan_save_alloc_info+0x40/0x58
[   24.081488]  __kasan_kmalloc+0xd4/0xd8
[   24.082315]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.082444]  kasan_atomics+0xb8/0x2e0
[   24.082523]  kunit_try_run_case+0x170/0x3f0
[   24.082601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.082694]  kthread+0x328/0x630
[   24.082771]  ret_from_fork+0x10/0x20
[   24.083397] 
[   24.083499] The buggy address belongs to the object at fff00000c63eb100
[   24.083499]  which belongs to the cache kmalloc-64 of size 64
[   24.083882] The buggy address is located 0 bytes to the right of
[   24.083882]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   24.084069] 
[   24.084148] The buggy address belongs to the physical page:
[   24.084272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   24.084416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.084550] page_type: f5(slab)
[   24.084648] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.084781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.084892] page dumped because: kasan: bad access detected
[   24.084981] 
[   24.085043] Memory state around the buggy address:
[   24.085436]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.085567]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.086116] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.086491]                                      ^
[   24.086608]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.087502]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.087716] ==================================================================
[   23.831681] ==================================================================
[   23.831803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   23.831917] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275
[   23.832050] 
[   23.832138] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   23.832417] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.832490] Hardware name: linux,dummy-virt (DT)
[   23.832617] Call trace:
[   23.832706]  show_stack+0x20/0x38 (C)
[   23.832820]  dump_stack_lvl+0x8c/0xd0
[   23.832933]  print_report+0x118/0x608
[   23.833041]  kasan_report+0xdc/0x128
[   23.833142]  kasan_check_range+0x100/0x1a8
[   23.833253]  __kasan_check_write+0x20/0x30
[   23.833359]  kasan_atomics_helper+0x99c/0x4858
[   23.833472]  kasan_atomics+0x198/0x2e0
[   23.833578]  kunit_try_run_case+0x170/0x3f0
[   23.833685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.833803]  kthread+0x328/0x630
[   23.833904]  ret_from_fork+0x10/0x20
[   23.834012] 
[   23.834078] Allocated by task 275:
[   23.834146]  kasan_save_stack+0x3c/0x68
[   23.834235]  kasan_save_track+0x20/0x40
[   23.834319]  kasan_save_alloc_info+0x40/0x58
[   23.834407]  __kasan_kmalloc+0xd4/0xd8
[   23.834494]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.834584]  kasan_atomics+0xb8/0x2e0
[   23.834662]  kunit_try_run_case+0x170/0x3f0
[   23.834746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.834842]  kthread+0x328/0x630
[   23.834925]  ret_from_fork+0x10/0x20
[   23.835006] 
[   23.835129] The buggy address belongs to the object at fff00000c63eb100
[   23.835129]  which belongs to the cache kmalloc-64 of size 64
[   23.835300] The buggy address is located 0 bytes to the right of
[   23.835300]  allocated 48-byte region [fff00000c63eb100, fff00000c63eb130)
[   23.835467] 
[   23.835520] The buggy address belongs to the physical page:
[   23.835596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb
[   23.835726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.835850] page_type: f5(slab)
[   23.835947] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.836092] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.836216] page dumped because: kasan: bad access detected
[   23.836314] 
[   23.836381] Memory state around the buggy address:
[   23.836504]  fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.836627]  fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.836722] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.836834]                                      ^
[   23.836915]  fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.837071]  fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.837164] ==================================================================

[   13.810829] ==================================================================
[   13.811138] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   13.811651] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   13.812183] 
[   13.812393] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.812444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.812457] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.812479] Call Trace:
[   13.812589]  <TASK>
[   13.812609]  dump_stack_lvl+0x73/0xb0
[   13.812640]  print_report+0xd1/0x650
[   13.812667]  ? __virt_addr_valid+0x1db/0x2d0
[   13.812690]  ? kasan_atomics_helper+0x7c7/0x5450
[   13.812712]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.812738]  ? kasan_atomics_helper+0x7c7/0x5450
[   13.812759]  kasan_report+0x141/0x180
[   13.812780]  ? kasan_atomics_helper+0x7c7/0x5450
[   13.812806]  kasan_check_range+0x10c/0x1c0
[   13.812829]  __kasan_check_write+0x18/0x20
[   13.812851]  kasan_atomics_helper+0x7c7/0x5450
[   13.812873]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.812895]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.812920]  ? kasan_atomics+0x152/0x310
[   13.812946]  kasan_atomics+0x1dc/0x310
[   13.812968]  ? __pfx_kasan_atomics+0x10/0x10
[   13.812991]  ? __pfx_read_tsc+0x10/0x10
[   13.813015]  ? ktime_get_ts64+0x86/0x230
[   13.813040]  kunit_try_run_case+0x1a5/0x480
[   13.813064]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.813086]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.813108]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.813130]  ? __kthread_parkme+0x82/0x180
[   13.813151]  ? preempt_count_sub+0x50/0x80
[   13.813175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.813197]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.813232]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.813255]  kthread+0x337/0x6f0
[   13.813274]  ? trace_preempt_on+0x20/0xc0
[   13.813297]  ? __pfx_kthread+0x10/0x10
[   13.813320]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.813341]  ? calculate_sigpending+0x7b/0xa0
[   13.813365]  ? __pfx_kthread+0x10/0x10
[   13.813387]  ret_from_fork+0x116/0x1d0
[   13.813406]  ? __pfx_kthread+0x10/0x10
[   13.813427]  ret_from_fork_asm+0x1a/0x30
[   13.813457]  </TASK>
[   13.813468] 
[   13.823775] Allocated by task 291:
[   13.824099]  kasan_save_stack+0x45/0x70
[   13.824388]  kasan_save_track+0x18/0x40
[   13.824671]  kasan_save_alloc_info+0x3b/0x50
[   13.824870]  __kasan_kmalloc+0xb7/0xc0
[   13.825045]  __kmalloc_cache_noprof+0x189/0x420
[   13.825527]  kasan_atomics+0x95/0x310
[   13.825703]  kunit_try_run_case+0x1a5/0x480
[   13.826026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.826341]  kthread+0x337/0x6f0
[   13.826614]  ret_from_fork+0x116/0x1d0
[   13.826868]  ret_from_fork_asm+0x1a/0x30
[   13.827129] 
[   13.827201] The buggy address belongs to the object at ffff8881029e2200
[   13.827201]  which belongs to the cache kmalloc-64 of size 64
[   13.827991] The buggy address is located 0 bytes to the right of
[   13.827991]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   13.828687] 
[   13.828775] The buggy address belongs to the physical page:
[   13.829135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   13.829611] flags: 0x200000000000000(node=0|zone=2)
[   13.829916] page_type: f5(slab)
[   13.830180] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.830520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.830800] page dumped because: kasan: bad access detected
[   13.831041] 
[   13.831117] Memory state around the buggy address:
[   13.831709]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.832087]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.832606] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.833033]                                      ^
[   13.833379]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.833770]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.834154] ==================================================================
[   14.427257] ==================================================================
[   14.427558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   14.428021] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.428400] 
[   14.428516] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.428562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.428586] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.428607] Call Trace:
[   14.428622]  <TASK>
[   14.428637]  dump_stack_lvl+0x73/0xb0
[   14.428666]  print_report+0xd1/0x650
[   14.428688]  ? __virt_addr_valid+0x1db/0x2d0
[   14.428709]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.428731]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.428756]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.428778]  kasan_report+0x141/0x180
[   14.428823]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.428849]  kasan_check_range+0x10c/0x1c0
[   14.428872]  __kasan_check_write+0x18/0x20
[   14.428904]  kasan_atomics_helper+0x16e7/0x5450
[   14.428926]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.428948]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.428983]  ? kasan_atomics+0x152/0x310
[   14.429008]  kasan_atomics+0x1dc/0x310
[   14.429031]  ? __pfx_kasan_atomics+0x10/0x10
[   14.429055]  ? __pfx_read_tsc+0x10/0x10
[   14.429076]  ? ktime_get_ts64+0x86/0x230
[   14.429100]  kunit_try_run_case+0x1a5/0x480
[   14.429123]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.429145]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.429166]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.429215]  ? __kthread_parkme+0x82/0x180
[   14.429236]  ? preempt_count_sub+0x50/0x80
[   14.429260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.429283]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.429306]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.429329]  kthread+0x337/0x6f0
[   14.429348]  ? trace_preempt_on+0x20/0xc0
[   14.429372]  ? __pfx_kthread+0x10/0x10
[   14.429393]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.429414]  ? calculate_sigpending+0x7b/0xa0
[   14.429437]  ? __pfx_kthread+0x10/0x10
[   14.429459]  ret_from_fork+0x116/0x1d0
[   14.429478]  ? __pfx_kthread+0x10/0x10
[   14.429499]  ret_from_fork_asm+0x1a/0x30
[   14.429530]  </TASK>
[   14.429542] 
[   14.437140] Allocated by task 291:
[   14.437318]  kasan_save_stack+0x45/0x70
[   14.437478]  kasan_save_track+0x18/0x40
[   14.437631]  kasan_save_alloc_info+0x3b/0x50
[   14.437869]  __kasan_kmalloc+0xb7/0xc0
[   14.438046]  __kmalloc_cache_noprof+0x189/0x420
[   14.438286]  kasan_atomics+0x95/0x310
[   14.438464]  kunit_try_run_case+0x1a5/0x480
[   14.438657]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.438896]  kthread+0x337/0x6f0
[   14.439052]  ret_from_fork+0x116/0x1d0
[   14.439259]  ret_from_fork_asm+0x1a/0x30
[   14.439445] 
[   14.439529] The buggy address belongs to the object at ffff8881029e2200
[   14.439529]  which belongs to the cache kmalloc-64 of size 64
[   14.440003] The buggy address is located 0 bytes to the right of
[   14.440003]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.440394] 
[   14.440459] The buggy address belongs to the physical page:
[   14.440623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.440971] flags: 0x200000000000000(node=0|zone=2)
[   14.441246] page_type: f5(slab)
[   14.441407] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.441767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.442094] page dumped because: kasan: bad access detected
[   14.442385] 
[   14.442472] Memory state around the buggy address:
[   14.442676]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.442943]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.443238] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.443512]                                      ^
[   14.443707]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.443917]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.445973] ==================================================================
[   14.533372] ==================================================================
[   14.533803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   14.534386] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.534686] 
[   14.534830] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.534875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.534888] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.534909] Call Trace:
[   14.534923]  <TASK>
[   14.534937]  dump_stack_lvl+0x73/0xb0
[   14.534962]  print_report+0xd1/0x650
[   14.534983]  ? __virt_addr_valid+0x1db/0x2d0
[   14.535005]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.535025]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.535076]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.535098]  kasan_report+0x141/0x180
[   14.535119]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.535144]  kasan_check_range+0x10c/0x1c0
[   14.535184]  __kasan_check_write+0x18/0x20
[   14.535215]  kasan_atomics_helper+0x1a7f/0x5450
[   14.535238]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.535269]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.535293]  ? kasan_atomics+0x152/0x310
[   14.535318]  kasan_atomics+0x1dc/0x310
[   14.535351]  ? __pfx_kasan_atomics+0x10/0x10
[   14.535375]  ? __pfx_read_tsc+0x10/0x10
[   14.535395]  ? ktime_get_ts64+0x86/0x230
[   14.535420]  kunit_try_run_case+0x1a5/0x480
[   14.535442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.535464]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.535485]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.535507]  ? __kthread_parkme+0x82/0x180
[   14.535527]  ? preempt_count_sub+0x50/0x80
[   14.535550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.535573]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.535604]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.535627]  kthread+0x337/0x6f0
[   14.535647]  ? trace_preempt_on+0x20/0xc0
[   14.535679]  ? __pfx_kthread+0x10/0x10
[   14.535700]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.535720]  ? calculate_sigpending+0x7b/0xa0
[   14.535743]  ? __pfx_kthread+0x10/0x10
[   14.535765]  ret_from_fork+0x116/0x1d0
[   14.535783]  ? __pfx_kthread+0x10/0x10
[   14.535804]  ret_from_fork_asm+0x1a/0x30
[   14.535833]  </TASK>
[   14.535844] 
[   14.543361] Allocated by task 291:
[   14.543521]  kasan_save_stack+0x45/0x70
[   14.543714]  kasan_save_track+0x18/0x40
[   14.543864]  kasan_save_alloc_info+0x3b/0x50
[   14.544011]  __kasan_kmalloc+0xb7/0xc0
[   14.544137]  __kmalloc_cache_noprof+0x189/0x420
[   14.544313]  kasan_atomics+0x95/0x310
[   14.544439]  kunit_try_run_case+0x1a5/0x480
[   14.544577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.544746]  kthread+0x337/0x6f0
[   14.544858]  ret_from_fork+0x116/0x1d0
[   14.545008]  ret_from_fork_asm+0x1a/0x30
[   14.545248] 
[   14.545334] The buggy address belongs to the object at ffff8881029e2200
[   14.545334]  which belongs to the cache kmalloc-64 of size 64
[   14.545842] The buggy address is located 0 bytes to the right of
[   14.545842]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.546400] 
[   14.546498] The buggy address belongs to the physical page:
[   14.546752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.547116] flags: 0x200000000000000(node=0|zone=2)
[   14.547373] page_type: f5(slab)
[   14.547553] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.547843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.548062] page dumped because: kasan: bad access detected
[   14.548257] 
[   14.548321] Memory state around the buggy address:
[   14.548469]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.548682]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.548889] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.549243]                                      ^
[   14.549487]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.549818]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.550158] ==================================================================
[   14.223761] ==================================================================
[   14.224004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   14.224406] Read of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.225081] 
[   14.225461] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.225510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.225524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.225633] Call Trace:
[   14.225648]  <TASK>
[   14.225663]  dump_stack_lvl+0x73/0xb0
[   14.225692]  print_report+0xd1/0x650
[   14.225714]  ? __virt_addr_valid+0x1db/0x2d0
[   14.225735]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.225757]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.225782]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.225804]  kasan_report+0x141/0x180
[   14.225825]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.225850]  __asan_report_load4_noabort+0x18/0x20
[   14.225874]  kasan_atomics_helper+0x49e8/0x5450
[   14.225896]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.225918]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.225942]  ? kasan_atomics+0x152/0x310
[   14.225967]  kasan_atomics+0x1dc/0x310
[   14.225989]  ? __pfx_kasan_atomics+0x10/0x10
[   14.226013]  ? __pfx_read_tsc+0x10/0x10
[   14.226033]  ? ktime_get_ts64+0x86/0x230
[   14.226058]  kunit_try_run_case+0x1a5/0x480
[   14.226081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.226103]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.226125]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.226147]  ? __kthread_parkme+0x82/0x180
[   14.226168]  ? preempt_count_sub+0x50/0x80
[   14.226191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.226226]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.226249]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.226271]  kthread+0x337/0x6f0
[   14.226291]  ? trace_preempt_on+0x20/0xc0
[   14.226313]  ? __pfx_kthread+0x10/0x10
[   14.226334]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.226354]  ? calculate_sigpending+0x7b/0xa0
[   14.226378]  ? __pfx_kthread+0x10/0x10
[   14.226400]  ret_from_fork+0x116/0x1d0
[   14.226419]  ? __pfx_kthread+0x10/0x10
[   14.226439]  ret_from_fork_asm+0x1a/0x30
[   14.226469]  </TASK>
[   14.226480] 
[   14.236472] Allocated by task 291:
[   14.236779]  kasan_save_stack+0x45/0x70
[   14.237036]  kasan_save_track+0x18/0x40
[   14.237228]  kasan_save_alloc_info+0x3b/0x50
[   14.237574]  __kasan_kmalloc+0xb7/0xc0
[   14.237743]  __kmalloc_cache_noprof+0x189/0x420
[   14.238049]  kasan_atomics+0x95/0x310
[   14.238333]  kunit_try_run_case+0x1a5/0x480
[   14.238490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.238833]  kthread+0x337/0x6f0
[   14.238969]  ret_from_fork+0x116/0x1d0
[   14.239154]  ret_from_fork_asm+0x1a/0x30
[   14.239562] 
[   14.239658] The buggy address belongs to the object at ffff8881029e2200
[   14.239658]  which belongs to the cache kmalloc-64 of size 64
[   14.240331] The buggy address is located 0 bytes to the right of
[   14.240331]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.240969] 
[   14.241066] The buggy address belongs to the physical page:
[   14.241488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.241811] flags: 0x200000000000000(node=0|zone=2)
[   14.242097] page_type: f5(slab)
[   14.242225] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.242685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.243091] page dumped because: kasan: bad access detected
[   14.243390] 
[   14.243640] Memory state around the buggy address:
[   14.243826]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.244183]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.244653] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.245020]                                      ^
[   14.245219]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.245716]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.246092] ==================================================================
[   13.608292] ==================================================================
[   13.608790] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   13.609243] Read of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   13.609750] 
[   13.609860] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.610135] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.610149] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.610171] Call Trace:
[   13.610182]  <TASK>
[   13.610196]  dump_stack_lvl+0x73/0xb0
[   13.610238]  print_report+0xd1/0x650
[   13.610259]  ? __virt_addr_valid+0x1db/0x2d0
[   13.610280]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.610300]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.610325]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.610346]  kasan_report+0x141/0x180
[   13.610366]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.610391]  __asan_report_load4_noabort+0x18/0x20
[   13.610414]  kasan_atomics_helper+0x4b88/0x5450
[   13.610435]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.610456]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.610479]  ? kasan_atomics+0x152/0x310
[   13.610504]  kasan_atomics+0x1dc/0x310
[   13.610525]  ? __pfx_kasan_atomics+0x10/0x10
[   13.610547]  ? __pfx_read_tsc+0x10/0x10
[   13.610567]  ? ktime_get_ts64+0x86/0x230
[   13.610590]  kunit_try_run_case+0x1a5/0x480
[   13.610613]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.610634]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.610656]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.610789]  ? __kthread_parkme+0x82/0x180
[   13.610810]  ? preempt_count_sub+0x50/0x80
[   13.610852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.610876]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.610899]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.610923]  kthread+0x337/0x6f0
[   13.610942]  ? trace_preempt_on+0x20/0xc0
[   13.610966]  ? __pfx_kthread+0x10/0x10
[   13.610987]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.611008]  ? calculate_sigpending+0x7b/0xa0
[   13.611032]  ? __pfx_kthread+0x10/0x10
[   13.611053]  ret_from_fork+0x116/0x1d0
[   13.611072]  ? __pfx_kthread+0x10/0x10
[   13.611095]  ret_from_fork_asm+0x1a/0x30
[   13.611126]  </TASK>
[   13.611137] 
[   13.619052] Allocated by task 291:
[   13.619292]  kasan_save_stack+0x45/0x70
[   13.619488]  kasan_save_track+0x18/0x40
[   13.619690]  kasan_save_alloc_info+0x3b/0x50
[   13.619928]  __kasan_kmalloc+0xb7/0xc0
[   13.620115]  __kmalloc_cache_noprof+0x189/0x420
[   13.620677]  kasan_atomics+0x95/0x310
[   13.621117]  kunit_try_run_case+0x1a5/0x480
[   13.621826]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.622062]  kthread+0x337/0x6f0
[   13.622241]  ret_from_fork+0x116/0x1d0
[   13.622421]  ret_from_fork_asm+0x1a/0x30
[   13.622594] 
[   13.622673] The buggy address belongs to the object at ffff8881029e2200
[   13.622673]  which belongs to the cache kmalloc-64 of size 64
[   13.623082] The buggy address is located 0 bytes to the right of
[   13.623082]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   13.623534] 
[   13.623598] The buggy address belongs to the physical page:
[   13.623811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   13.624157] flags: 0x200000000000000(node=0|zone=2)
[   13.624422] page_type: f5(slab)
[   13.624580] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.624815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.625129] page dumped because: kasan: bad access detected
[   13.625406] 
[   13.625492] Memory state around the buggy address:
[   13.625677]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.625921]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.626235] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.626447]                                      ^
[   13.626588]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.626890]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.627223] ==================================================================
[   13.747942] ==================================================================
[   13.748422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   13.748887] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   13.749252] 
[   13.749353] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.749400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.749414] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.749437] Call Trace:
[   13.749449]  <TASK>
[   13.749463]  dump_stack_lvl+0x73/0xb0
[   13.749490]  print_report+0xd1/0x650
[   13.749523]  ? __virt_addr_valid+0x1db/0x2d0
[   13.749545]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.749566]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.749602]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.749623]  kasan_report+0x141/0x180
[   13.749645]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.749670]  kasan_check_range+0x10c/0x1c0
[   13.749702]  __kasan_check_write+0x18/0x20
[   13.749724]  kasan_atomics_helper+0x5fe/0x5450
[   13.749746]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.749778]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.749802]  ? kasan_atomics+0x152/0x310
[   13.749827]  kasan_atomics+0x1dc/0x310
[   13.749849]  ? __pfx_kasan_atomics+0x10/0x10
[   13.749872]  ? __pfx_read_tsc+0x10/0x10
[   13.749902]  ? ktime_get_ts64+0x86/0x230
[   13.749926]  kunit_try_run_case+0x1a5/0x480
[   13.749949]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.749980]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.750002]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.750024]  ? __kthread_parkme+0x82/0x180
[   13.750044]  ? preempt_count_sub+0x50/0x80
[   13.750068]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.750100]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.750123]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.750146]  kthread+0x337/0x6f0
[   13.750175]  ? trace_preempt_on+0x20/0xc0
[   13.750199]  ? __pfx_kthread+0x10/0x10
[   13.750229]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.750249]  ? calculate_sigpending+0x7b/0xa0
[   13.750275]  ? __pfx_kthread+0x10/0x10
[   13.750296]  ret_from_fork+0x116/0x1d0
[   13.750315]  ? __pfx_kthread+0x10/0x10
[   13.750336]  ret_from_fork_asm+0x1a/0x30
[   13.750366]  </TASK>
[   13.750377] 
[   13.760344] Allocated by task 291:
[   13.760749]  kasan_save_stack+0x45/0x70
[   13.760946]  kasan_save_track+0x18/0x40
[   13.761271]  kasan_save_alloc_info+0x3b/0x50
[   13.761562]  __kasan_kmalloc+0xb7/0xc0
[   13.761709]  __kmalloc_cache_noprof+0x189/0x420
[   13.762051]  kasan_atomics+0x95/0x310
[   13.762284]  kunit_try_run_case+0x1a5/0x480
[   13.762629]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.762862]  kthread+0x337/0x6f0
[   13.763038]  ret_from_fork+0x116/0x1d0
[   13.763359]  ret_from_fork_asm+0x1a/0x30
[   13.763638] 
[   13.763726] The buggy address belongs to the object at ffff8881029e2200
[   13.763726]  which belongs to the cache kmalloc-64 of size 64
[   13.764527] The buggy address is located 0 bytes to the right of
[   13.764527]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   13.765128] 
[   13.765224] The buggy address belongs to the physical page:
[   13.765551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   13.766060] flags: 0x200000000000000(node=0|zone=2)
[   13.766379] page_type: f5(slab)
[   13.766534] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.766848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.767151] page dumped because: kasan: bad access detected
[   13.767686] 
[   13.767771] Memory state around the buggy address:
[   13.768125]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.768576]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.768982] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.769248]                                      ^
[   13.769672]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.769973]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.770401] ==================================================================
[   14.794154] ==================================================================
[   14.794542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   14.794866] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.795196] 
[   14.795304] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.795350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.795363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.795384] Call Trace:
[   14.795410]  <TASK>
[   14.795425]  dump_stack_lvl+0x73/0xb0
[   14.795451]  print_report+0xd1/0x650
[   14.795486]  ? __virt_addr_valid+0x1db/0x2d0
[   14.795510]  ? kasan_atomics_helper+0x218a/0x5450
[   14.795534]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.795561]  ? kasan_atomics_helper+0x218a/0x5450
[   14.795592]  kasan_report+0x141/0x180
[   14.795614]  ? kasan_atomics_helper+0x218a/0x5450
[   14.795652]  kasan_check_range+0x10c/0x1c0
[   14.795676]  __kasan_check_write+0x18/0x20
[   14.795699]  kasan_atomics_helper+0x218a/0x5450
[   14.795730]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.795752]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.795777]  ? kasan_atomics+0x152/0x310
[   14.795813]  kasan_atomics+0x1dc/0x310
[   14.795835]  ? __pfx_kasan_atomics+0x10/0x10
[   14.795859]  ? __pfx_read_tsc+0x10/0x10
[   14.795880]  ? ktime_get_ts64+0x86/0x230
[   14.795914]  kunit_try_run_case+0x1a5/0x480
[   14.795937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.795969]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.795991]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.796014]  ? __kthread_parkme+0x82/0x180
[   14.796043]  ? preempt_count_sub+0x50/0x80
[   14.796067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.796091]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.796123]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.796147]  kthread+0x337/0x6f0
[   14.796192]  ? trace_preempt_on+0x20/0xc0
[   14.796223]  ? __pfx_kthread+0x10/0x10
[   14.796244]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.796275]  ? calculate_sigpending+0x7b/0xa0
[   14.796298]  ? __pfx_kthread+0x10/0x10
[   14.796321]  ret_from_fork+0x116/0x1d0
[   14.796340]  ? __pfx_kthread+0x10/0x10
[   14.796369]  ret_from_fork_asm+0x1a/0x30
[   14.796399]  </TASK>
[   14.796410] 
[   14.807920] Allocated by task 291:
[   14.808304]  kasan_save_stack+0x45/0x70
[   14.808686]  kasan_save_track+0x18/0x40
[   14.808962]  kasan_save_alloc_info+0x3b/0x50
[   14.809341]  __kasan_kmalloc+0xb7/0xc0
[   14.809469]  __kmalloc_cache_noprof+0x189/0x420
[   14.809612]  kasan_atomics+0x95/0x310
[   14.809735]  kunit_try_run_case+0x1a5/0x480
[   14.809871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.810032]  kthread+0x337/0x6f0
[   14.810141]  ret_from_fork+0x116/0x1d0
[   14.810522]  ret_from_fork_asm+0x1a/0x30
[   14.810869] 
[   14.811045] The buggy address belongs to the object at ffff8881029e2200
[   14.811045]  which belongs to the cache kmalloc-64 of size 64
[   14.812131] The buggy address is located 0 bytes to the right of
[   14.812131]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.813270] 
[   14.813421] The buggy address belongs to the physical page:
[   14.813923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.814646] flags: 0x200000000000000(node=0|zone=2)
[   14.815099] page_type: f5(slab)
[   14.815451] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.815895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.816120] page dumped because: kasan: bad access detected
[   14.816619] 
[   14.816773] Memory state around the buggy address:
[   14.817284]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.817902]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.818542] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.818917]                                      ^
[   14.819067]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.819563]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.820211] ==================================================================
[   13.771109] ==================================================================
[   13.771757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   13.772167] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   13.772567] 
[   13.772659] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.772705] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.772719] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.772741] Call Trace:
[   13.772758]  <TASK>
[   13.772773]  dump_stack_lvl+0x73/0xb0
[   13.772800]  print_report+0xd1/0x650
[   13.772822]  ? __virt_addr_valid+0x1db/0x2d0
[   13.772844]  ? kasan_atomics_helper+0x697/0x5450
[   13.772865]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.772890]  ? kasan_atomics_helper+0x697/0x5450
[   13.772912]  kasan_report+0x141/0x180
[   13.772933]  ? kasan_atomics_helper+0x697/0x5450
[   13.772959]  kasan_check_range+0x10c/0x1c0
[   13.772981]  __kasan_check_write+0x18/0x20
[   13.773004]  kasan_atomics_helper+0x697/0x5450
[   13.773026]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.773048]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.773071]  ? kasan_atomics+0x152/0x310
[   13.773096]  kasan_atomics+0x1dc/0x310
[   13.773118]  ? __pfx_kasan_atomics+0x10/0x10
[   13.773142]  ? __pfx_read_tsc+0x10/0x10
[   13.773162]  ? ktime_get_ts64+0x86/0x230
[   13.773186]  kunit_try_run_case+0x1a5/0x480
[   13.773221]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.773243]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.773264]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.773287]  ? __kthread_parkme+0x82/0x180
[   13.773308]  ? preempt_count_sub+0x50/0x80
[   13.773330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.773354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.773376]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.773399]  kthread+0x337/0x6f0
[   13.773418]  ? trace_preempt_on+0x20/0xc0
[   13.773443]  ? __pfx_kthread+0x10/0x10
[   13.773463]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.773484]  ? calculate_sigpending+0x7b/0xa0
[   13.773509]  ? __pfx_kthread+0x10/0x10
[   13.773530]  ret_from_fork+0x116/0x1d0
[   13.773548]  ? __pfx_kthread+0x10/0x10
[   13.773569]  ret_from_fork_asm+0x1a/0x30
[   13.773599]  </TASK>
[   13.773609] 
[   13.780627] Allocated by task 291:
[   13.780797]  kasan_save_stack+0x45/0x70
[   13.780985]  kasan_save_track+0x18/0x40
[   13.781164]  kasan_save_alloc_info+0x3b/0x50
[   13.781353]  __kasan_kmalloc+0xb7/0xc0
[   13.781479]  __kmalloc_cache_noprof+0x189/0x420
[   13.781627]  kasan_atomics+0x95/0x310
[   13.781751]  kunit_try_run_case+0x1a5/0x480
[   13.781954]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.782220]  kthread+0x337/0x6f0
[   13.782387]  ret_from_fork+0x116/0x1d0
[   13.782539]  ret_from_fork_asm+0x1a/0x30
[   13.782708] 
[   13.782771] The buggy address belongs to the object at ffff8881029e2200
[   13.782771]  which belongs to the cache kmalloc-64 of size 64
[   13.783293] The buggy address is located 0 bytes to the right of
[   13.783293]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   13.783705] 
[   13.783786] The buggy address belongs to the physical page:
[   13.783952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   13.784184] flags: 0x200000000000000(node=0|zone=2)
[   13.784511] page_type: f5(slab)
[   13.784698] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.785021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.785378] page dumped because: kasan: bad access detected
[   13.785617] 
[   13.785701] Memory state around the buggy address:
[   13.785912]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.786250]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.786463] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.786669]                                      ^
[   13.786820]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.787138]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.787510] ==================================================================
[   13.627737] ==================================================================
[   13.628069] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   13.628712] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   13.629044] 
[   13.629125] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.629192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.629214] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.629235] Call Trace:
[   13.629250]  <TASK>
[   13.629264]  dump_stack_lvl+0x73/0xb0
[   13.629292]  print_report+0xd1/0x650
[   13.629314]  ? __virt_addr_valid+0x1db/0x2d0
[   13.629336]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.629357]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.629383]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.629406]  kasan_report+0x141/0x180
[   13.629427]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.629452]  __asan_report_store4_noabort+0x1b/0x30
[   13.629477]  kasan_atomics_helper+0x4b6e/0x5450
[   13.629500]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.629522]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.629546]  ? kasan_atomics+0x152/0x310
[   13.629571]  kasan_atomics+0x1dc/0x310
[   13.629594]  ? __pfx_kasan_atomics+0x10/0x10
[   13.629618]  ? __pfx_read_tsc+0x10/0x10
[   13.629639]  ? ktime_get_ts64+0x86/0x230
[   13.629664]  kunit_try_run_case+0x1a5/0x480
[   13.629687]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.629710]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.629733]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.629755]  ? __kthread_parkme+0x82/0x180
[   13.629777]  ? preempt_count_sub+0x50/0x80
[   13.629800]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.629824]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.629846]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.629870]  kthread+0x337/0x6f0
[   13.629889]  ? trace_preempt_on+0x20/0xc0
[   13.629913]  ? __pfx_kthread+0x10/0x10
[   13.629934]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.629955]  ? calculate_sigpending+0x7b/0xa0
[   13.629978]  ? __pfx_kthread+0x10/0x10
[   13.630000]  ret_from_fork+0x116/0x1d0
[   13.630019]  ? __pfx_kthread+0x10/0x10
[   13.630040]  ret_from_fork_asm+0x1a/0x30
[   13.630070]  </TASK>
[   13.630081] 
[   13.636658] Allocated by task 291:
[   13.636819]  kasan_save_stack+0x45/0x70
[   13.636971]  kasan_save_track+0x18/0x40
[   13.637095]  kasan_save_alloc_info+0x3b/0x50
[   13.637266]  __kasan_kmalloc+0xb7/0xc0
[   13.637391]  __kmalloc_cache_noprof+0x189/0x420
[   13.637540]  kasan_atomics+0x95/0x310
[   13.637714]  kunit_try_run_case+0x1a5/0x480
[   13.637914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.638153]  kthread+0x337/0x6f0
[   13.638338]  ret_from_fork+0x116/0x1d0
[   13.638515]  ret_from_fork_asm+0x1a/0x30
[   13.638708] 
[   13.638797] The buggy address belongs to the object at ffff8881029e2200
[   13.638797]  which belongs to the cache kmalloc-64 of size 64
[   13.639348] The buggy address is located 0 bytes to the right of
[   13.639348]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   13.639785] 
[   13.639870] The buggy address belongs to the physical page:
[   13.640113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   13.640388] flags: 0x200000000000000(node=0|zone=2)
[   13.640540] page_type: f5(slab)
[   13.640654] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.640870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.641154] page dumped because: kasan: bad access detected
[   13.641417] 
[   13.641500] Memory state around the buggy address:
[   13.641709]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.642007]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.642311] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.642551]                                      ^
[   13.642693]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.642893]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.643099] ==================================================================
[   13.722045] ==================================================================
[   13.723467] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   13.723931] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   13.724243] 
[   13.724346] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.724392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.724405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.724427] Call Trace:
[   13.724439]  <TASK>
[   13.724453]  dump_stack_lvl+0x73/0xb0
[   13.724480]  print_report+0xd1/0x650
[   13.724502]  ? __virt_addr_valid+0x1db/0x2d0
[   13.724525]  ? kasan_atomics_helper+0x565/0x5450
[   13.724546]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.724572]  ? kasan_atomics_helper+0x565/0x5450
[   13.724594]  kasan_report+0x141/0x180
[   13.724615]  ? kasan_atomics_helper+0x565/0x5450
[   13.724641]  kasan_check_range+0x10c/0x1c0
[   13.724669]  __kasan_check_write+0x18/0x20
[   13.724691]  kasan_atomics_helper+0x565/0x5450
[   13.724714]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.724736]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.724760]  ? kasan_atomics+0x152/0x310
[   13.724786]  kasan_atomics+0x1dc/0x310
[   13.724808]  ? __pfx_kasan_atomics+0x10/0x10
[   13.724832]  ? __pfx_read_tsc+0x10/0x10
[   13.724853]  ? ktime_get_ts64+0x86/0x230
[   13.724877]  kunit_try_run_case+0x1a5/0x480
[   13.724901]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.724924]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.724946]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.724968]  ? __kthread_parkme+0x82/0x180
[   13.724988]  ? preempt_count_sub+0x50/0x80
[   13.725011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.725034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.725057]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.725079]  kthread+0x337/0x6f0
[   13.725099]  ? trace_preempt_on+0x20/0xc0
[   13.725122]  ? __pfx_kthread+0x10/0x10
[   13.725143]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.725163]  ? calculate_sigpending+0x7b/0xa0
[   13.725187]  ? __pfx_kthread+0x10/0x10
[   13.725426]  ret_from_fork+0x116/0x1d0
[   13.725453]  ? __pfx_kthread+0x10/0x10
[   13.725476]  ret_from_fork_asm+0x1a/0x30
[   13.725521]  </TASK>
[   13.725532] 
[   13.736686] Allocated by task 291:
[   13.736991]  kasan_save_stack+0x45/0x70
[   13.737360]  kasan_save_track+0x18/0x40
[   13.737538]  kasan_save_alloc_info+0x3b/0x50
[   13.737713]  __kasan_kmalloc+0xb7/0xc0
[   13.737866]  __kmalloc_cache_noprof+0x189/0x420
[   13.738056]  kasan_atomics+0x95/0x310
[   13.738267]  kunit_try_run_case+0x1a5/0x480
[   13.738448]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.738661]  kthread+0x337/0x6f0
[   13.738807]  ret_from_fork+0x116/0x1d0
[   13.738970]  ret_from_fork_asm+0x1a/0x30
[   13.739140] 
[   13.739665] The buggy address belongs to the object at ffff8881029e2200
[   13.739665]  which belongs to the cache kmalloc-64 of size 64
[   13.740545] The buggy address is located 0 bytes to the right of
[   13.740545]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   13.741361] 
[   13.741584] The buggy address belongs to the physical page:
[   13.742003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   13.742595] flags: 0x200000000000000(node=0|zone=2)
[   13.742943] page_type: f5(slab)
[   13.743312] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.743808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.744406] page dumped because: kasan: bad access detected
[   13.744634] 
[   13.744717] Memory state around the buggy address:
[   13.744913]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.745189]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.745452] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.745754]                                      ^
[   13.745952]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.746180]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.746526] ==================================================================
[   13.926682] ==================================================================
[   13.926924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   13.927148] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   13.928190] 
[   13.928415] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.928473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.928486] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.928508] Call Trace:
[   13.928525]  <TASK>
[   13.928541]  dump_stack_lvl+0x73/0xb0
[   13.928569]  print_report+0xd1/0x650
[   13.928592]  ? __virt_addr_valid+0x1db/0x2d0
[   13.928615]  ? kasan_atomics_helper+0xb6a/0x5450
[   13.928636]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.928665]  ? kasan_atomics_helper+0xb6a/0x5450
[   13.928686]  kasan_report+0x141/0x180
[   13.928709]  ? kasan_atomics_helper+0xb6a/0x5450
[   13.928735]  kasan_check_range+0x10c/0x1c0
[   13.928757]  __kasan_check_write+0x18/0x20
[   13.928781]  kasan_atomics_helper+0xb6a/0x5450
[   13.928803]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.928825]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.928850]  ? kasan_atomics+0x152/0x310
[   13.928875]  kasan_atomics+0x1dc/0x310
[   13.928897]  ? __pfx_kasan_atomics+0x10/0x10
[   13.928920]  ? __pfx_read_tsc+0x10/0x10
[   13.928942]  ? ktime_get_ts64+0x86/0x230
[   13.928966]  kunit_try_run_case+0x1a5/0x480
[   13.928990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.929011]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.929035]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.929058]  ? __kthread_parkme+0x82/0x180
[   13.929078]  ? preempt_count_sub+0x50/0x80
[   13.929102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.929125]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.929148]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.929171]  kthread+0x337/0x6f0
[   13.929191]  ? trace_preempt_on+0x20/0xc0
[   13.929226]  ? __pfx_kthread+0x10/0x10
[   13.929247]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.929267]  ? calculate_sigpending+0x7b/0xa0
[   13.929291]  ? __pfx_kthread+0x10/0x10
[   13.929312]  ret_from_fork+0x116/0x1d0
[   13.929331]  ? __pfx_kthread+0x10/0x10
[   13.929351]  ret_from_fork_asm+0x1a/0x30
[   13.929382]  </TASK>
[   13.929393] 
[   13.939685] Allocated by task 291:
[   13.939883]  kasan_save_stack+0x45/0x70
[   13.940077]  kasan_save_track+0x18/0x40
[   13.940529]  kasan_save_alloc_info+0x3b/0x50
[   13.940816]  __kasan_kmalloc+0xb7/0xc0
[   13.941089]  __kmalloc_cache_noprof+0x189/0x420
[   13.941470]  kasan_atomics+0x95/0x310
[   13.941656]  kunit_try_run_case+0x1a5/0x480
[   13.941842]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.942066]  kthread+0x337/0x6f0
[   13.942490]  ret_from_fork+0x116/0x1d0
[   13.942723]  ret_from_fork_asm+0x1a/0x30
[   13.943022] 
[   13.943248] The buggy address belongs to the object at ffff8881029e2200
[   13.943248]  which belongs to the cache kmalloc-64 of size 64
[   13.943987] The buggy address is located 0 bytes to the right of
[   13.943987]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   13.944714] 
[   13.944812] The buggy address belongs to the physical page:
[   13.945041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   13.945757] flags: 0x200000000000000(node=0|zone=2)
[   13.946028] page_type: f5(slab)
[   13.946313] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.946804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.947475] page dumped because: kasan: bad access detected
[   13.947711] 
[   13.947793] Memory state around the buggy address:
[   13.947986]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.948529]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.948987] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.949497]                                      ^
[   13.949932]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.950354]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.950755] ==================================================================
[   14.376853] ==================================================================
[   14.377419] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   14.377782] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.378103] 
[   14.378199] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.378253] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.378265] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.378286] Call Trace:
[   14.378301]  <TASK>
[   14.378315]  dump_stack_lvl+0x73/0xb0
[   14.378340]  print_report+0xd1/0x650
[   14.378372]  ? __virt_addr_valid+0x1db/0x2d0
[   14.378395]  ? kasan_atomics_helper+0x151d/0x5450
[   14.378416]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.378452]  ? kasan_atomics_helper+0x151d/0x5450
[   14.378475]  kasan_report+0x141/0x180
[   14.378496]  ? kasan_atomics_helper+0x151d/0x5450
[   14.378522]  kasan_check_range+0x10c/0x1c0
[   14.378554]  __kasan_check_write+0x18/0x20
[   14.378577]  kasan_atomics_helper+0x151d/0x5450
[   14.378609]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.378632]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.378656]  ? kasan_atomics+0x152/0x310
[   14.378682]  kasan_atomics+0x1dc/0x310
[   14.378704]  ? __pfx_kasan_atomics+0x10/0x10
[   14.378728]  ? __pfx_read_tsc+0x10/0x10
[   14.378750]  ? ktime_get_ts64+0x86/0x230
[   14.378774]  kunit_try_run_case+0x1a5/0x480
[   14.378798]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.378820]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.378849]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.378871]  ? __kthread_parkme+0x82/0x180
[   14.378892]  ? preempt_count_sub+0x50/0x80
[   14.378926]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.378950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.378973]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.378997]  kthread+0x337/0x6f0
[   14.379016]  ? trace_preempt_on+0x20/0xc0
[   14.379039]  ? __pfx_kthread+0x10/0x10
[   14.379059]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.379080]  ? calculate_sigpending+0x7b/0xa0
[   14.379104]  ? __pfx_kthread+0x10/0x10
[   14.379126]  ret_from_fork+0x116/0x1d0
[   14.379145]  ? __pfx_kthread+0x10/0x10
[   14.379165]  ret_from_fork_asm+0x1a/0x30
[   14.379195]  </TASK>
[   14.379213] 
[   14.386369] Allocated by task 291:
[   14.386565]  kasan_save_stack+0x45/0x70
[   14.386778]  kasan_save_track+0x18/0x40
[   14.386970]  kasan_save_alloc_info+0x3b/0x50
[   14.387143]  __kasan_kmalloc+0xb7/0xc0
[   14.387337]  __kmalloc_cache_noprof+0x189/0x420
[   14.387550]  kasan_atomics+0x95/0x310
[   14.387735]  kunit_try_run_case+0x1a5/0x480
[   14.387932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.388100]  kthread+0x337/0x6f0
[   14.388263]  ret_from_fork+0x116/0x1d0
[   14.388441]  ret_from_fork_asm+0x1a/0x30
[   14.388662] 
[   14.388749] The buggy address belongs to the object at ffff8881029e2200
[   14.388749]  which belongs to the cache kmalloc-64 of size 64
[   14.389152] The buggy address is located 0 bytes to the right of
[   14.389152]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.389694] 
[   14.389804] The buggy address belongs to the physical page:
[   14.390008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.390355] flags: 0x200000000000000(node=0|zone=2)
[   14.390588] page_type: f5(slab)
[   14.390738] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.391055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.391322] page dumped because: kasan: bad access detected
[   14.391488] 
[   14.391550] Memory state around the buggy address:
[   14.391697]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.391924]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.392279] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.392582]                                      ^
[   14.392795]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.393100]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.393342] ==================================================================
[   14.592486] ==================================================================
[   14.593450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   14.594082] Read of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.594742] 
[   14.594910] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.594956] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.594968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.594990] Call Trace:
[   14.595005]  <TASK>
[   14.595020]  dump_stack_lvl+0x73/0xb0
[   14.595045]  print_report+0xd1/0x650
[   14.595067]  ? __virt_addr_valid+0x1db/0x2d0
[   14.595089]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.595110]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.595136]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.595157]  kasan_report+0x141/0x180
[   14.595179]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.595216]  __asan_report_load8_noabort+0x18/0x20
[   14.595240]  kasan_atomics_helper+0x4f30/0x5450
[   14.595262]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.595284]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.595309]  ? kasan_atomics+0x152/0x310
[   14.595334]  kasan_atomics+0x1dc/0x310
[   14.595356]  ? __pfx_kasan_atomics+0x10/0x10
[   14.595379]  ? __pfx_read_tsc+0x10/0x10
[   14.595400]  ? ktime_get_ts64+0x86/0x230
[   14.595424]  kunit_try_run_case+0x1a5/0x480
[   14.595447]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.595468]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.595490]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.595512]  ? __kthread_parkme+0x82/0x180
[   14.595532]  ? preempt_count_sub+0x50/0x80
[   14.595555]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.595578]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.595601]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.595624]  kthread+0x337/0x6f0
[   14.595642]  ? trace_preempt_on+0x20/0xc0
[   14.595665]  ? __pfx_kthread+0x10/0x10
[   14.595685]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.595706]  ? calculate_sigpending+0x7b/0xa0
[   14.595728]  ? __pfx_kthread+0x10/0x10
[   14.595750]  ret_from_fork+0x116/0x1d0
[   14.595769]  ? __pfx_kthread+0x10/0x10
[   14.595789]  ret_from_fork_asm+0x1a/0x30
[   14.595820]  </TASK>
[   14.595831] 
[   14.603381] Allocated by task 291:
[   14.603556]  kasan_save_stack+0x45/0x70
[   14.603734]  kasan_save_track+0x18/0x40
[   14.603902]  kasan_save_alloc_info+0x3b/0x50
[   14.604042]  __kasan_kmalloc+0xb7/0xc0
[   14.604167]  __kmalloc_cache_noprof+0x189/0x420
[   14.604383]  kasan_atomics+0x95/0x310
[   14.604565]  kunit_try_run_case+0x1a5/0x480
[   14.604764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.604974]  kthread+0x337/0x6f0
[   14.605121]  ret_from_fork+0x116/0x1d0
[   14.605374]  ret_from_fork_asm+0x1a/0x30
[   14.605538] 
[   14.605616] The buggy address belongs to the object at ffff8881029e2200
[   14.605616]  which belongs to the cache kmalloc-64 of size 64
[   14.606052] The buggy address is located 0 bytes to the right of
[   14.606052]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.606551] 
[   14.606625] The buggy address belongs to the physical page:
[   14.606839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.607136] flags: 0x200000000000000(node=0|zone=2)
[   14.607499] page_type: f5(slab)
[   14.607615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.607929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.608149] page dumped because: kasan: bad access detected
[   14.608323] 
[   14.608385] Memory state around the buggy address:
[   14.608533]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.608774]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.609078] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.609671]                                      ^
[   14.609850]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.610061]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.610277] ==================================================================
[   14.694553] ==================================================================
[   14.694816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   14.695045] Read of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.695348] 
[   14.695501] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.695546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.695577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.695599] Call Trace:
[   14.695625]  <TASK>
[   14.695640]  dump_stack_lvl+0x73/0xb0
[   14.695666]  print_report+0xd1/0x650
[   14.695688]  ? __virt_addr_valid+0x1db/0x2d0
[   14.695711]  ? kasan_atomics_helper+0x4f71/0x5450
[   14.695732]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.695759]  ? kasan_atomics_helper+0x4f71/0x5450
[   14.695781]  kasan_report+0x141/0x180
[   14.695802]  ? kasan_atomics_helper+0x4f71/0x5450
[   14.695828]  __asan_report_load8_noabort+0x18/0x20
[   14.695852]  kasan_atomics_helper+0x4f71/0x5450
[   14.695874]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.695896]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.695920]  ? kasan_atomics+0x152/0x310
[   14.695946]  kasan_atomics+0x1dc/0x310
[   14.695987]  ? __pfx_kasan_atomics+0x10/0x10
[   14.696011]  ? __pfx_read_tsc+0x10/0x10
[   14.696032]  ? ktime_get_ts64+0x86/0x230
[   14.696056]  kunit_try_run_case+0x1a5/0x480
[   14.696079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.696101]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.696122]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.696145]  ? __kthread_parkme+0x82/0x180
[   14.696185]  ? preempt_count_sub+0x50/0x80
[   14.696218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.696242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.696265]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.696288]  kthread+0x337/0x6f0
[   14.696307]  ? trace_preempt_on+0x20/0xc0
[   14.696330]  ? __pfx_kthread+0x10/0x10
[   14.696367]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.696388]  ? calculate_sigpending+0x7b/0xa0
[   14.696413]  ? __pfx_kthread+0x10/0x10
[   14.696434]  ret_from_fork+0x116/0x1d0
[   14.696453]  ? __pfx_kthread+0x10/0x10
[   14.696473]  ret_from_fork_asm+0x1a/0x30
[   14.696503]  </TASK>
[   14.696513] 
[   14.705563] Allocated by task 291:
[   14.705732]  kasan_save_stack+0x45/0x70
[   14.705918]  kasan_save_track+0x18/0x40
[   14.706090]  kasan_save_alloc_info+0x3b/0x50
[   14.706596]  __kasan_kmalloc+0xb7/0xc0
[   14.707453]  __kmalloc_cache_noprof+0x189/0x420
[   14.707623]  kasan_atomics+0x95/0x310
[   14.707751]  kunit_try_run_case+0x1a5/0x480
[   14.707891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.708058]  kthread+0x337/0x6f0
[   14.708170]  ret_from_fork+0x116/0x1d0
[   14.708321]  ret_from_fork_asm+0x1a/0x30
[   14.708455] 
[   14.708520] The buggy address belongs to the object at ffff8881029e2200
[   14.708520]  which belongs to the cache kmalloc-64 of size 64
[   14.709275] The buggy address is located 0 bytes to the right of
[   14.709275]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.709801] 
[   14.709895] The buggy address belongs to the physical page:
[   14.710068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.710665] flags: 0x200000000000000(node=0|zone=2)
[   14.711033] page_type: f5(slab)
[   14.711169] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.713648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.714995] page dumped because: kasan: bad access detected
[   14.715855] 
[   14.716022] Memory state around the buggy address:
[   14.716715]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.717641]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.718311] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.718529]                                      ^
[   14.718681]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.718892]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.719099] ==================================================================
[   13.951365] ==================================================================
[   13.951822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   13.952115] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   13.952440] 
[   13.952544] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.952590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.952603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.952625] Call Trace:
[   13.952640]  <TASK>
[   13.952658]  dump_stack_lvl+0x73/0xb0
[   13.952685]  print_report+0xd1/0x650
[   13.952707]  ? __virt_addr_valid+0x1db/0x2d0
[   13.952729]  ? kasan_atomics_helper+0xc70/0x5450
[   13.952752]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.952778]  ? kasan_atomics_helper+0xc70/0x5450
[   13.952799]  kasan_report+0x141/0x180
[   13.952820]  ? kasan_atomics_helper+0xc70/0x5450
[   13.952846]  kasan_check_range+0x10c/0x1c0
[   13.952869]  __kasan_check_write+0x18/0x20
[   13.952891]  kasan_atomics_helper+0xc70/0x5450
[   13.952913]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.952935]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.952960]  ? kasan_atomics+0x152/0x310
[   13.952985]  kasan_atomics+0x1dc/0x310
[   13.953007]  ? __pfx_kasan_atomics+0x10/0x10
[   13.953030]  ? __pfx_read_tsc+0x10/0x10
[   13.953051]  ? ktime_get_ts64+0x86/0x230
[   13.953076]  kunit_try_run_case+0x1a5/0x480
[   13.953099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.953121]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.953142]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.953164]  ? __kthread_parkme+0x82/0x180
[   13.953184]  ? preempt_count_sub+0x50/0x80
[   13.953219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.953243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.953266]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.953289]  kthread+0x337/0x6f0
[   13.953309]  ? trace_preempt_on+0x20/0xc0
[   13.953332]  ? __pfx_kthread+0x10/0x10
[   13.953352]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.953373]  ? calculate_sigpending+0x7b/0xa0
[   13.953396]  ? __pfx_kthread+0x10/0x10
[   13.953418]  ret_from_fork+0x116/0x1d0
[   13.953436]  ? __pfx_kthread+0x10/0x10
[   13.953457]  ret_from_fork_asm+0x1a/0x30
[   13.953486]  </TASK>
[   13.953498] 
[   13.960377] Allocated by task 291:
[   13.960501]  kasan_save_stack+0x45/0x70
[   13.960637]  kasan_save_track+0x18/0x40
[   13.960821]  kasan_save_alloc_info+0x3b/0x50
[   13.961021]  __kasan_kmalloc+0xb7/0xc0
[   13.961198]  __kmalloc_cache_noprof+0x189/0x420
[   13.961415]  kasan_atomics+0x95/0x310
[   13.961590]  kunit_try_run_case+0x1a5/0x480
[   13.961784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.961982]  kthread+0x337/0x6f0
[   13.962097]  ret_from_fork+0x116/0x1d0
[   13.962341]  ret_from_fork_asm+0x1a/0x30
[   13.962530] 
[   13.962616] The buggy address belongs to the object at ffff8881029e2200
[   13.962616]  which belongs to the cache kmalloc-64 of size 64
[   13.963073] The buggy address is located 0 bytes to the right of
[   13.963073]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   13.963501] 
[   13.963567] The buggy address belongs to the physical page:
[   13.963808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   13.964149] flags: 0x200000000000000(node=0|zone=2)
[   13.964432] page_type: f5(slab)
[   13.964547] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.964776] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.964998] page dumped because: kasan: bad access detected
[   13.965187] 
[   13.965279] Memory state around the buggy address:
[   13.965492]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.965802]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.966109] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.966360]                                      ^
[   13.966508]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.966715]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.966920] ==================================================================
[   14.568055] ==================================================================
[   14.568394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   14.568712] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.568929] 
[   14.569004] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.569050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.569062] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.569083] Call Trace:
[   14.569097]  <TASK>
[   14.569112]  dump_stack_lvl+0x73/0xb0
[   14.569136]  print_report+0xd1/0x650
[   14.569157]  ? __virt_addr_valid+0x1db/0x2d0
[   14.569211]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.569233]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.569268]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.569290]  kasan_report+0x141/0x180
[   14.569313]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.569350]  kasan_check_range+0x10c/0x1c0
[   14.569373]  __kasan_check_write+0x18/0x20
[   14.569396]  kasan_atomics_helper+0x1c18/0x5450
[   14.569417]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.569439]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.569463]  ? kasan_atomics+0x152/0x310
[   14.569489]  kasan_atomics+0x1dc/0x310
[   14.569511]  ? __pfx_kasan_atomics+0x10/0x10
[   14.569535]  ? __pfx_read_tsc+0x10/0x10
[   14.569555]  ? ktime_get_ts64+0x86/0x230
[   14.569580]  kunit_try_run_case+0x1a5/0x480
[   14.569603]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.569625]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.569646]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.569669]  ? __kthread_parkme+0x82/0x180
[   14.569689]  ? preempt_count_sub+0x50/0x80
[   14.569712]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.569735]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.569758]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.569781]  kthread+0x337/0x6f0
[   14.569800]  ? trace_preempt_on+0x20/0xc0
[   14.569823]  ? __pfx_kthread+0x10/0x10
[   14.569844]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.569865]  ? calculate_sigpending+0x7b/0xa0
[   14.569888]  ? __pfx_kthread+0x10/0x10
[   14.569910]  ret_from_fork+0x116/0x1d0
[   14.569930]  ? __pfx_kthread+0x10/0x10
[   14.569950]  ret_from_fork_asm+0x1a/0x30
[   14.569981]  </TASK>
[   14.569991] 
[   14.580912] Allocated by task 291:
[   14.581071]  kasan_save_stack+0x45/0x70
[   14.581722]  kasan_save_track+0x18/0x40
[   14.581888]  kasan_save_alloc_info+0x3b/0x50
[   14.582298]  __kasan_kmalloc+0xb7/0xc0
[   14.582464]  __kmalloc_cache_noprof+0x189/0x420
[   14.582802]  kasan_atomics+0x95/0x310
[   14.582986]  kunit_try_run_case+0x1a5/0x480
[   14.583355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.583679]  kthread+0x337/0x6f0
[   14.583818]  ret_from_fork+0x116/0x1d0
[   14.584109]  ret_from_fork_asm+0x1a/0x30
[   14.584351] 
[   14.584584] The buggy address belongs to the object at ffff8881029e2200
[   14.584584]  which belongs to the cache kmalloc-64 of size 64
[   14.585112] The buggy address is located 0 bytes to the right of
[   14.585112]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.585933] 
[   14.586015] The buggy address belongs to the physical page:
[   14.586273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.586764] flags: 0x200000000000000(node=0|zone=2)
[   14.587068] page_type: f5(slab)
[   14.587197] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.587600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.588062] page dumped because: kasan: bad access detected
[   14.588420] 
[   14.588497] Memory state around the buggy address:
[   14.588787]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.589232]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.589913] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.590644]                                      ^
[   14.590802]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.591013]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.591633] ==================================================================
[   14.020760] ==================================================================
[   14.021083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   14.021408] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.021690] 
[   14.021789] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.021833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.021846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.021867] Call Trace:
[   14.021882]  <TASK>
[   14.021897]  dump_stack_lvl+0x73/0xb0
[   14.021921]  print_report+0xd1/0x650
[   14.021942]  ? __virt_addr_valid+0x1db/0x2d0
[   14.021965]  ? kasan_atomics_helper+0xe78/0x5450
[   14.021986]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.022011]  ? kasan_atomics_helper+0xe78/0x5450
[   14.022033]  kasan_report+0x141/0x180
[   14.022054]  ? kasan_atomics_helper+0xe78/0x5450
[   14.022079]  kasan_check_range+0x10c/0x1c0
[   14.022102]  __kasan_check_write+0x18/0x20
[   14.022126]  kasan_atomics_helper+0xe78/0x5450
[   14.022148]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.022170]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.022196]  ? kasan_atomics+0x152/0x310
[   14.022233]  kasan_atomics+0x1dc/0x310
[   14.022255]  ? __pfx_kasan_atomics+0x10/0x10
[   14.022279]  ? __pfx_read_tsc+0x10/0x10
[   14.022300]  ? ktime_get_ts64+0x86/0x230
[   14.022324]  kunit_try_run_case+0x1a5/0x480
[   14.022347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.022373]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.022397]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.022422]  ? __kthread_parkme+0x82/0x180
[   14.022443]  ? preempt_count_sub+0x50/0x80
[   14.022467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.022491]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.022514]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.022537]  kthread+0x337/0x6f0
[   14.022557]  ? trace_preempt_on+0x20/0xc0
[   14.022582]  ? __pfx_kthread+0x10/0x10
[   14.022602]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.022622]  ? calculate_sigpending+0x7b/0xa0
[   14.022645]  ? __pfx_kthread+0x10/0x10
[   14.022667]  ret_from_fork+0x116/0x1d0
[   14.022685]  ? __pfx_kthread+0x10/0x10
[   14.022706]  ret_from_fork_asm+0x1a/0x30
[   14.022736]  </TASK>
[   14.022747] 
[   14.029882] Allocated by task 291:
[   14.030032]  kasan_save_stack+0x45/0x70
[   14.030225]  kasan_save_track+0x18/0x40
[   14.030391]  kasan_save_alloc_info+0x3b/0x50
[   14.030543]  __kasan_kmalloc+0xb7/0xc0
[   14.030669]  __kmalloc_cache_noprof+0x189/0x420
[   14.030870]  kasan_atomics+0x95/0x310
[   14.031044]  kunit_try_run_case+0x1a5/0x480
[   14.031280]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.031453]  kthread+0x337/0x6f0
[   14.031581]  ret_from_fork+0x116/0x1d0
[   14.031758]  ret_from_fork_asm+0x1a/0x30
[   14.031947] 
[   14.032032] The buggy address belongs to the object at ffff8881029e2200
[   14.032032]  which belongs to the cache kmalloc-64 of size 64
[   14.032507] The buggy address is located 0 bytes to the right of
[   14.032507]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.032995] 
[   14.033070] The buggy address belongs to the physical page:
[   14.033320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.033632] flags: 0x200000000000000(node=0|zone=2)
[   14.033820] page_type: f5(slab)
[   14.033969] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.034330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.034620] page dumped because: kasan: bad access detected
[   14.034804] 
[   14.034867] Memory state around the buggy address:
[   14.035014]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.035235]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.035443] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.035649]                                      ^
[   14.035795]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.036100]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.036410] ==================================================================
[   14.199295] ==================================================================
[   14.200572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   14.201465] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.202046] 
[   14.202134] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.202182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.202195] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.202229] Call Trace:
[   14.202246]  <TASK>
[   14.202261]  dump_stack_lvl+0x73/0xb0
[   14.202289]  print_report+0xd1/0x650
[   14.202310]  ? __virt_addr_valid+0x1db/0x2d0
[   14.202333]  ? kasan_atomics_helper+0x1217/0x5450
[   14.202354]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.202380]  ? kasan_atomics_helper+0x1217/0x5450
[   14.202401]  kasan_report+0x141/0x180
[   14.202423]  ? kasan_atomics_helper+0x1217/0x5450
[   14.202448]  kasan_check_range+0x10c/0x1c0
[   14.202472]  __kasan_check_write+0x18/0x20
[   14.202494]  kasan_atomics_helper+0x1217/0x5450
[   14.202516]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.202538]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.202563]  ? kasan_atomics+0x152/0x310
[   14.202587]  kasan_atomics+0x1dc/0x310
[   14.202611]  ? __pfx_kasan_atomics+0x10/0x10
[   14.202634]  ? __pfx_read_tsc+0x10/0x10
[   14.202655]  ? ktime_get_ts64+0x86/0x230
[   14.202679]  kunit_try_run_case+0x1a5/0x480
[   14.202703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.202725]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.202746]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.202769]  ? __kthread_parkme+0x82/0x180
[   14.202789]  ? preempt_count_sub+0x50/0x80
[   14.202812]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.202836]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.202859]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.202882]  kthread+0x337/0x6f0
[   14.202901]  ? trace_preempt_on+0x20/0xc0
[   14.202924]  ? __pfx_kthread+0x10/0x10
[   14.202945]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.202966]  ? calculate_sigpending+0x7b/0xa0
[   14.202990]  ? __pfx_kthread+0x10/0x10
[   14.203012]  ret_from_fork+0x116/0x1d0
[   14.203031]  ? __pfx_kthread+0x10/0x10
[   14.203052]  ret_from_fork_asm+0x1a/0x30
[   14.203082]  </TASK>
[   14.203092] 
[   14.213243] Allocated by task 291:
[   14.213425]  kasan_save_stack+0x45/0x70
[   14.213619]  kasan_save_track+0x18/0x40
[   14.213781]  kasan_save_alloc_info+0x3b/0x50
[   14.213961]  __kasan_kmalloc+0xb7/0xc0
[   14.214125]  __kmalloc_cache_noprof+0x189/0x420
[   14.214924]  kasan_atomics+0x95/0x310
[   14.215168]  kunit_try_run_case+0x1a5/0x480
[   14.215471]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.215781]  kthread+0x337/0x6f0
[   14.215904]  ret_from_fork+0x116/0x1d0
[   14.216238]  ret_from_fork_asm+0x1a/0x30
[   14.216444] 
[   14.216692] The buggy address belongs to the object at ffff8881029e2200
[   14.216692]  which belongs to the cache kmalloc-64 of size 64
[   14.217350] The buggy address is located 0 bytes to the right of
[   14.217350]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.217932] 
[   14.218150] The buggy address belongs to the physical page:
[   14.218368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.218833] flags: 0x200000000000000(node=0|zone=2)
[   14.219147] page_type: f5(slab)
[   14.219282] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.219740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.220119] page dumped because: kasan: bad access detected
[   14.220434] 
[   14.220659] Memory state around the buggy address:
[   14.220829]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.221303]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.221681] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.221976]                                      ^
[   14.222349]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.222720]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.223114] ==================================================================
[   14.661523] ==================================================================
[   14.661904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   14.662635] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.662933] 
[   14.663011] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.663056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.663069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.663090] Call Trace:
[   14.663104]  <TASK>
[   14.663118]  dump_stack_lvl+0x73/0xb0
[   14.663144]  print_report+0xd1/0x650
[   14.663187]  ? __virt_addr_valid+0x1db/0x2d0
[   14.663220]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.663241]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.663266]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.663288]  kasan_report+0x141/0x180
[   14.663310]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.663336]  kasan_check_range+0x10c/0x1c0
[   14.663359]  __kasan_check_write+0x18/0x20
[   14.663382]  kasan_atomics_helper+0x1eaa/0x5450
[   14.663404]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.663425]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.663450]  ? kasan_atomics+0x152/0x310
[   14.663475]  kasan_atomics+0x1dc/0x310
[   14.663497]  ? __pfx_kasan_atomics+0x10/0x10
[   14.663520]  ? __pfx_read_tsc+0x10/0x10
[   14.663541]  ? ktime_get_ts64+0x86/0x230
[   14.663566]  kunit_try_run_case+0x1a5/0x480
[   14.663589]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.663610]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.663632]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.663655]  ? __kthread_parkme+0x82/0x180
[   14.663675]  ? preempt_count_sub+0x50/0x80
[   14.663699]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.663723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.663745]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.663768]  kthread+0x337/0x6f0
[   14.663787]  ? trace_preempt_on+0x20/0xc0
[   14.663810]  ? __pfx_kthread+0x10/0x10
[   14.663830]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.663851]  ? calculate_sigpending+0x7b/0xa0
[   14.663874]  ? __pfx_kthread+0x10/0x10
[   14.663896]  ret_from_fork+0x116/0x1d0
[   14.663914]  ? __pfx_kthread+0x10/0x10
[   14.663935]  ret_from_fork_asm+0x1a/0x30
[   14.663964]  </TASK>
[   14.663975] 
[   14.671020] Allocated by task 291:
[   14.671229]  kasan_save_stack+0x45/0x70
[   14.671426]  kasan_save_track+0x18/0x40
[   14.671611]  kasan_save_alloc_info+0x3b/0x50
[   14.671812]  __kasan_kmalloc+0xb7/0xc0
[   14.671991]  __kmalloc_cache_noprof+0x189/0x420
[   14.672211]  kasan_atomics+0x95/0x310
[   14.672346]  kunit_try_run_case+0x1a5/0x480
[   14.672537]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.672755]  kthread+0x337/0x6f0
[   14.672866]  ret_from_fork+0x116/0x1d0
[   14.672988]  ret_from_fork_asm+0x1a/0x30
[   14.673115] 
[   14.673201] The buggy address belongs to the object at ffff8881029e2200
[   14.673201]  which belongs to the cache kmalloc-64 of size 64
[   14.673670] The buggy address is located 0 bytes to the right of
[   14.673670]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.674242] 
[   14.674333] The buggy address belongs to the physical page:
[   14.674595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.674865] flags: 0x200000000000000(node=0|zone=2)
[   14.675015] page_type: f5(slab)
[   14.675125] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.675379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.675671] page dumped because: kasan: bad access detected
[   14.675927] 
[   14.676011] Memory state around the buggy address:
[   14.676263]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.676586]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.676910] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.677255]                                      ^
[   14.677474]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.677678]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.677925] ==================================================================
[   14.644516] ==================================================================
[   14.645250] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   14.645794] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.646007] 
[   14.646085] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.646131] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.646143] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.646165] Call Trace:
[   14.646186]  <TASK>
[   14.646200]  dump_stack_lvl+0x73/0xb0
[   14.646234]  print_report+0xd1/0x650
[   14.646256]  ? __virt_addr_valid+0x1db/0x2d0
[   14.646278]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.646301]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.646327]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.646348]  kasan_report+0x141/0x180
[   14.646370]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.646396]  kasan_check_range+0x10c/0x1c0
[   14.646420]  __kasan_check_write+0x18/0x20
[   14.646443]  kasan_atomics_helper+0x1e12/0x5450
[   14.646465]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.646486]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.646510]  ? kasan_atomics+0x152/0x310
[   14.646537]  kasan_atomics+0x1dc/0x310
[   14.646559]  ? __pfx_kasan_atomics+0x10/0x10
[   14.646584]  ? __pfx_read_tsc+0x10/0x10
[   14.646605]  ? ktime_get_ts64+0x86/0x230
[   14.646629]  kunit_try_run_case+0x1a5/0x480
[   14.646652]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.646675]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.646697]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.646718]  ? __kthread_parkme+0x82/0x180
[   14.646738]  ? preempt_count_sub+0x50/0x80
[   14.646762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.646784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.646807]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.646830]  kthread+0x337/0x6f0
[   14.646849]  ? trace_preempt_on+0x20/0xc0
[   14.646871]  ? __pfx_kthread+0x10/0x10
[   14.646892]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.646912]  ? calculate_sigpending+0x7b/0xa0
[   14.646936]  ? __pfx_kthread+0x10/0x10
[   14.646957]  ret_from_fork+0x116/0x1d0
[   14.646975]  ? __pfx_kthread+0x10/0x10
[   14.646996]  ret_from_fork_asm+0x1a/0x30
[   14.647026]  </TASK>
[   14.647036] 
[   14.654377] Allocated by task 291:
[   14.654547]  kasan_save_stack+0x45/0x70
[   14.654689]  kasan_save_track+0x18/0x40
[   14.654890]  kasan_save_alloc_info+0x3b/0x50
[   14.655037]  __kasan_kmalloc+0xb7/0xc0
[   14.655159]  __kmalloc_cache_noprof+0x189/0x420
[   14.655398]  kasan_atomics+0x95/0x310
[   14.655578]  kunit_try_run_case+0x1a5/0x480
[   14.655799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.656042]  kthread+0x337/0x6f0
[   14.656248]  ret_from_fork+0x116/0x1d0
[   14.656375]  ret_from_fork_asm+0x1a/0x30
[   14.656503] 
[   14.656566] The buggy address belongs to the object at ffff8881029e2200
[   14.656566]  which belongs to the cache kmalloc-64 of size 64
[   14.656992] The buggy address is located 0 bytes to the right of
[   14.656992]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.657545] 
[   14.657631] The buggy address belongs to the physical page:
[   14.657866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.658095] flags: 0x200000000000000(node=0|zone=2)
[   14.658338] page_type: f5(slab)
[   14.658500] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.658828] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.659068] page dumped because: kasan: bad access detected
[   14.659334] 
[   14.659437] Memory state around the buggy address:
[   14.659644]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.659846]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.660080] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.660408]                                      ^
[   14.660609]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.660818]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.661016] ==================================================================
[   14.759918] ==================================================================
[   14.760530] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   14.760836] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.761121] 
[   14.761276] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.761322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.761335] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.761357] Call Trace:
[   14.761372]  <TASK>
[   14.761386]  dump_stack_lvl+0x73/0xb0
[   14.761412]  print_report+0xd1/0x650
[   14.761435]  ? __virt_addr_valid+0x1db/0x2d0
[   14.761457]  ? kasan_atomics_helper+0x20c8/0x5450
[   14.761478]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.761504]  ? kasan_atomics_helper+0x20c8/0x5450
[   14.761525]  kasan_report+0x141/0x180
[   14.761547]  ? kasan_atomics_helper+0x20c8/0x5450
[   14.761573]  kasan_check_range+0x10c/0x1c0
[   14.761595]  __kasan_check_write+0x18/0x20
[   14.761630]  kasan_atomics_helper+0x20c8/0x5450
[   14.761652]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.761675]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.761710]  ? kasan_atomics+0x152/0x310
[   14.761735]  kasan_atomics+0x1dc/0x310
[   14.761758]  ? __pfx_kasan_atomics+0x10/0x10
[   14.761781]  ? __pfx_read_tsc+0x10/0x10
[   14.761802]  ? ktime_get_ts64+0x86/0x230
[   14.761826]  kunit_try_run_case+0x1a5/0x480
[   14.761850]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.761872]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.761894]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.761925]  ? __kthread_parkme+0x82/0x180
[   14.761946]  ? preempt_count_sub+0x50/0x80
[   14.761969]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.762002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.762024]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.762048]  kthread+0x337/0x6f0
[   14.762076]  ? trace_preempt_on+0x20/0xc0
[   14.762099]  ? __pfx_kthread+0x10/0x10
[   14.762120]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.762150]  ? calculate_sigpending+0x7b/0xa0
[   14.762191]  ? __pfx_kthread+0x10/0x10
[   14.762230]  ret_from_fork+0x116/0x1d0
[   14.762251]  ? __pfx_kthread+0x10/0x10
[   14.762274]  ret_from_fork_asm+0x1a/0x30
[   14.762316]  </TASK>
[   14.762327] 
[   14.769582] Allocated by task 291:
[   14.769747]  kasan_save_stack+0x45/0x70
[   14.769943]  kasan_save_track+0x18/0x40
[   14.770117]  kasan_save_alloc_info+0x3b/0x50
[   14.770321]  __kasan_kmalloc+0xb7/0xc0
[   14.770450]  __kmalloc_cache_noprof+0x189/0x420
[   14.770598]  kasan_atomics+0x95/0x310
[   14.770723]  kunit_try_run_case+0x1a5/0x480
[   14.770861]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.771027]  kthread+0x337/0x6f0
[   14.771144]  ret_from_fork+0x116/0x1d0
[   14.771367]  ret_from_fork_asm+0x1a/0x30
[   14.771553] 
[   14.771638] The buggy address belongs to the object at ffff8881029e2200
[   14.771638]  which belongs to the cache kmalloc-64 of size 64
[   14.772143] The buggy address is located 0 bytes to the right of
[   14.772143]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.772680] 
[   14.772746] The buggy address belongs to the physical page:
[   14.772911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.773142] flags: 0x200000000000000(node=0|zone=2)
[   14.773322] page_type: f5(slab)
[   14.773476] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.773830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.774154] page dumped because: kasan: bad access detected
[   14.774434] 
[   14.774522] Memory state around the buggy address:
[   14.774733]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.775064]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.775402] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.775707]                                      ^
[   14.775913]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.776182]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.776451] ==================================================================
[   13.904841] ==================================================================
[   13.905065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   13.905360] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   13.905746] 
[   13.905846] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.905891] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.905904] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.905925] Call Trace:
[   13.905940]  <TASK>
[   13.905954]  dump_stack_lvl+0x73/0xb0
[   13.905979]  print_report+0xd1/0x650
[   13.906000]  ? __virt_addr_valid+0x1db/0x2d0
[   13.906023]  ? kasan_atomics_helper+0xac7/0x5450
[   13.906043]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.906068]  ? kasan_atomics_helper+0xac7/0x5450
[   13.906089]  kasan_report+0x141/0x180
[   13.906110]  ? kasan_atomics_helper+0xac7/0x5450
[   13.906135]  kasan_check_range+0x10c/0x1c0
[   13.906159]  __kasan_check_write+0x18/0x20
[   13.906196]  kasan_atomics_helper+0xac7/0x5450
[   13.906255]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.906278]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.906303]  ? kasan_atomics+0x152/0x310
[   13.906328]  kasan_atomics+0x1dc/0x310
[   13.906350]  ? __pfx_kasan_atomics+0x10/0x10
[   13.906374]  ? __pfx_read_tsc+0x10/0x10
[   13.906396]  ? ktime_get_ts64+0x86/0x230
[   13.906421]  kunit_try_run_case+0x1a5/0x480
[   13.906444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.906485]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.906507]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.906541]  ? __kthread_parkme+0x82/0x180
[   13.906562]  ? preempt_count_sub+0x50/0x80
[   13.906586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.906610]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.906634]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.906657]  kthread+0x337/0x6f0
[   13.906676]  ? trace_preempt_on+0x20/0xc0
[   13.906700]  ? __pfx_kthread+0x10/0x10
[   13.906720]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.906741]  ? calculate_sigpending+0x7b/0xa0
[   13.906765]  ? __pfx_kthread+0x10/0x10
[   13.906786]  ret_from_fork+0x116/0x1d0
[   13.906804]  ? __pfx_kthread+0x10/0x10
[   13.906825]  ret_from_fork_asm+0x1a/0x30
[   13.906856]  </TASK>
[   13.906866] 
[   13.916155] Allocated by task 291:
[   13.916333]  kasan_save_stack+0x45/0x70
[   13.916512]  kasan_save_track+0x18/0x40
[   13.916689]  kasan_save_alloc_info+0x3b/0x50
[   13.916882]  __kasan_kmalloc+0xb7/0xc0
[   13.917048]  __kmalloc_cache_noprof+0x189/0x420
[   13.917716]  kasan_atomics+0x95/0x310
[   13.917916]  kunit_try_run_case+0x1a5/0x480
[   13.918324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.918748]  kthread+0x337/0x6f0
[   13.919022]  ret_from_fork+0x116/0x1d0
[   13.919324]  ret_from_fork_asm+0x1a/0x30
[   13.919616] 
[   13.919806] The buggy address belongs to the object at ffff8881029e2200
[   13.919806]  which belongs to the cache kmalloc-64 of size 64
[   13.920546] The buggy address is located 0 bytes to the right of
[   13.920546]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   13.921595] 
[   13.921696] The buggy address belongs to the physical page:
[   13.922039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   13.922339] flags: 0x200000000000000(node=0|zone=2)
[   13.922504] page_type: f5(slab)
[   13.923000] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.923448] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.923685] page dumped because: kasan: bad access detected
[   13.923854] 
[   13.923918] Memory state around the buggy address:
[   13.924066]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.924288]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.924499] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.925003]                                      ^
[   13.925171]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.925396]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.925870] ==================================================================
[   14.246752] ==================================================================
[   14.247059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   14.247564] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.247853] 
[   14.247939] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.247983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.247996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.248018] Call Trace:
[   14.248032]  <TASK>
[   14.248046]  dump_stack_lvl+0x73/0xb0
[   14.248072]  print_report+0xd1/0x650
[   14.248093]  ? __virt_addr_valid+0x1db/0x2d0
[   14.248115]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.248136]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.248162]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.248183]  kasan_report+0x141/0x180
[   14.248215]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.248240]  kasan_check_range+0x10c/0x1c0
[   14.248263]  __kasan_check_write+0x18/0x20
[   14.248286]  kasan_atomics_helper+0x12e6/0x5450
[   14.248309]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.248330]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.248354]  ? kasan_atomics+0x152/0x310
[   14.248380]  kasan_atomics+0x1dc/0x310
[   14.248402]  ? __pfx_kasan_atomics+0x10/0x10
[   14.248426]  ? __pfx_read_tsc+0x10/0x10
[   14.248446]  ? ktime_get_ts64+0x86/0x230
[   14.248470]  kunit_try_run_case+0x1a5/0x480
[   14.248494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.248515]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.248537]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.248559]  ? __kthread_parkme+0x82/0x180
[   14.248580]  ? preempt_count_sub+0x50/0x80
[   14.248603]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.248626]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.248652]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.248675]  kthread+0x337/0x6f0
[   14.248695]  ? trace_preempt_on+0x20/0xc0
[   14.248718]  ? __pfx_kthread+0x10/0x10
[   14.248739]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.248759]  ? calculate_sigpending+0x7b/0xa0
[   14.248783]  ? __pfx_kthread+0x10/0x10
[   14.248805]  ret_from_fork+0x116/0x1d0
[   14.248824]  ? __pfx_kthread+0x10/0x10
[   14.248845]  ret_from_fork_asm+0x1a/0x30
[   14.248875]  </TASK>
[   14.248886] 
[   14.258658] Allocated by task 291:
[   14.258991]  kasan_save_stack+0x45/0x70
[   14.259312]  kasan_save_track+0x18/0x40
[   14.259455]  kasan_save_alloc_info+0x3b/0x50
[   14.259783]  __kasan_kmalloc+0xb7/0xc0
[   14.259965]  __kmalloc_cache_noprof+0x189/0x420
[   14.260325]  kasan_atomics+0x95/0x310
[   14.260502]  kunit_try_run_case+0x1a5/0x480
[   14.260832]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.261149]  kthread+0x337/0x6f0
[   14.261283]  ret_from_fork+0x116/0x1d0
[   14.261569]  ret_from_fork_asm+0x1a/0x30
[   14.261855] 
[   14.261948] The buggy address belongs to the object at ffff8881029e2200
[   14.261948]  which belongs to the cache kmalloc-64 of size 64
[   14.262679] The buggy address is located 0 bytes to the right of
[   14.262679]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.263172] 
[   14.263247] The buggy address belongs to the physical page:
[   14.263478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.263799] flags: 0x200000000000000(node=0|zone=2)
[   14.264007] page_type: f5(slab)
[   14.264154] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.264878] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.265297] page dumped because: kasan: bad access detected
[   14.265503] 
[   14.265722] Memory state around the buggy address:
[   14.265906]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.266389]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.266742] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.267013]                                      ^
[   14.267357]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.267717]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.267978] ==================================================================
[   14.153775] ==================================================================
[   14.154124] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   14.154498] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.154716] 
[   14.154792] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.154836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.154848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.154870] Call Trace:
[   14.154884]  <TASK>
[   14.154898]  dump_stack_lvl+0x73/0xb0
[   14.154924]  print_report+0xd1/0x650
[   14.154944]  ? __virt_addr_valid+0x1db/0x2d0
[   14.154966]  ? kasan_atomics_helper+0x1148/0x5450
[   14.154987]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.155013]  ? kasan_atomics_helper+0x1148/0x5450
[   14.155047]  kasan_report+0x141/0x180
[   14.155069]  ? kasan_atomics_helper+0x1148/0x5450
[   14.155105]  kasan_check_range+0x10c/0x1c0
[   14.155129]  __kasan_check_write+0x18/0x20
[   14.155151]  kasan_atomics_helper+0x1148/0x5450
[   14.155174]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.155195]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.155237]  ? kasan_atomics+0x152/0x310
[   14.155262]  kasan_atomics+0x1dc/0x310
[   14.155284]  ? __pfx_kasan_atomics+0x10/0x10
[   14.155318]  ? __pfx_read_tsc+0x10/0x10
[   14.155338]  ? ktime_get_ts64+0x86/0x230
[   14.155363]  kunit_try_run_case+0x1a5/0x480
[   14.155387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.155409]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.155431]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.155453]  ? __kthread_parkme+0x82/0x180
[   14.155473]  ? preempt_count_sub+0x50/0x80
[   14.155497]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.155520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.155543]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.155566]  kthread+0x337/0x6f0
[   14.155585]  ? trace_preempt_on+0x20/0xc0
[   14.155617]  ? __pfx_kthread+0x10/0x10
[   14.155637]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.155658]  ? calculate_sigpending+0x7b/0xa0
[   14.155691]  ? __pfx_kthread+0x10/0x10
[   14.155713]  ret_from_fork+0x116/0x1d0
[   14.155731]  ? __pfx_kthread+0x10/0x10
[   14.155752]  ret_from_fork_asm+0x1a/0x30
[   14.155782]  </TASK>
[   14.155792] 
[   14.163594] Allocated by task 291:
[   14.163741]  kasan_save_stack+0x45/0x70
[   14.163922]  kasan_save_track+0x18/0x40
[   14.164096]  kasan_save_alloc_info+0x3b/0x50
[   14.164312]  __kasan_kmalloc+0xb7/0xc0
[   14.164439]  __kmalloc_cache_noprof+0x189/0x420
[   14.164586]  kasan_atomics+0x95/0x310
[   14.164713]  kunit_try_run_case+0x1a5/0x480
[   14.164851]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.165016]  kthread+0x337/0x6f0
[   14.165130]  ret_from_fork+0x116/0x1d0
[   14.165308]  ret_from_fork_asm+0x1a/0x30
[   14.165538] 
[   14.165623] The buggy address belongs to the object at ffff8881029e2200
[   14.165623]  which belongs to the cache kmalloc-64 of size 64
[   14.166126] The buggy address is located 0 bytes to the right of
[   14.166126]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.166596] 
[   14.166672] The buggy address belongs to the physical page:
[   14.166871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.167136] flags: 0x200000000000000(node=0|zone=2)
[   14.167539] page_type: f5(slab)
[   14.167702] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.168064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.168463] page dumped because: kasan: bad access detected
[   14.168709] 
[   14.168805] Memory state around the buggy address:
[   14.169035]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.169503]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.169715] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.169920]                                      ^
[   14.170065]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.170296]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.170618] ==================================================================
[   13.660732] ==================================================================
[   13.661263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   13.661750] Read of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   13.662062] 
[   13.662601] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.662687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.662701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.662724] Call Trace:
[   13.662739]  <TASK>
[   13.662754]  dump_stack_lvl+0x73/0xb0
[   13.662781]  print_report+0xd1/0x650
[   13.662803]  ? __virt_addr_valid+0x1db/0x2d0
[   13.662825]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.662847]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.662874]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.662895]  kasan_report+0x141/0x180
[   13.662917]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.662943]  __asan_report_load4_noabort+0x18/0x20
[   13.662967]  kasan_atomics_helper+0x4b54/0x5450
[   13.662989]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.663012]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.663037]  ? kasan_atomics+0x152/0x310
[   13.663062]  kasan_atomics+0x1dc/0x310
[   13.663085]  ? __pfx_kasan_atomics+0x10/0x10
[   13.663109]  ? __pfx_read_tsc+0x10/0x10
[   13.663130]  ? ktime_get_ts64+0x86/0x230
[   13.663154]  kunit_try_run_case+0x1a5/0x480
[   13.663199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.663231]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.663253]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.663275]  ? __kthread_parkme+0x82/0x180
[   13.663296]  ? preempt_count_sub+0x50/0x80
[   13.663319]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.664240]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.664277]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.664303]  kthread+0x337/0x6f0
[   13.664324]  ? trace_preempt_on+0x20/0xc0
[   13.664349]  ? __pfx_kthread+0x10/0x10
[   13.664370]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.664391]  ? calculate_sigpending+0x7b/0xa0
[   13.664414]  ? __pfx_kthread+0x10/0x10
[   13.664436]  ret_from_fork+0x116/0x1d0
[   13.664455]  ? __pfx_kthread+0x10/0x10
[   13.664475]  ret_from_fork_asm+0x1a/0x30
[   13.664506]  </TASK>
[   13.664517] 
[   13.678440] Allocated by task 291:
[   13.678624]  kasan_save_stack+0x45/0x70
[   13.678782]  kasan_save_track+0x18/0x40
[   13.678986]  kasan_save_alloc_info+0x3b/0x50
[   13.679216]  __kasan_kmalloc+0xb7/0xc0
[   13.679351]  __kmalloc_cache_noprof+0x189/0x420
[   13.679540]  kasan_atomics+0x95/0x310
[   13.679661]  kunit_try_run_case+0x1a5/0x480
[   13.679795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.680059]  kthread+0x337/0x6f0
[   13.680245]  ret_from_fork+0x116/0x1d0
[   13.680422]  ret_from_fork_asm+0x1a/0x30
[   13.680627] 
[   13.680720] The buggy address belongs to the object at ffff8881029e2200
[   13.680720]  which belongs to the cache kmalloc-64 of size 64
[   13.681175] The buggy address is located 0 bytes to the right of
[   13.681175]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   13.681533] 
[   13.681609] The buggy address belongs to the physical page:
[   13.681964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   13.682306] flags: 0x200000000000000(node=0|zone=2)
[   13.682494] page_type: f5(slab)
[   13.682645] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.682937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.683248] page dumped because: kasan: bad access detected
[   13.683483] 
[   13.683590] Memory state around the buggy address:
[   13.683809]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.684089]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.684359] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.684569]                                      ^
[   13.684724]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.684934]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.685284] ==================================================================
[   14.516741] ==================================================================
[   14.517098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   14.517406] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.517752] 
[   14.517851] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.517907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.517920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.517952] Call Trace:
[   14.517968]  <TASK>
[   14.517983]  dump_stack_lvl+0x73/0xb0
[   14.518008]  print_report+0xd1/0x650
[   14.518029]  ? __virt_addr_valid+0x1db/0x2d0
[   14.518051]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.518072]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.518098]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.518120]  kasan_report+0x141/0x180
[   14.518141]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.518186]  kasan_check_range+0x10c/0x1c0
[   14.518218]  __kasan_check_write+0x18/0x20
[   14.518240]  kasan_atomics_helper+0x19e3/0x5450
[   14.518263]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.518284]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.518308]  ? kasan_atomics+0x152/0x310
[   14.518333]  kasan_atomics+0x1dc/0x310
[   14.518356]  ? __pfx_kasan_atomics+0x10/0x10
[   14.518379]  ? __pfx_read_tsc+0x10/0x10
[   14.518399]  ? ktime_get_ts64+0x86/0x230
[   14.518424]  kunit_try_run_case+0x1a5/0x480
[   14.518447]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.518468]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.518490]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.518513]  ? __kthread_parkme+0x82/0x180
[   14.518533]  ? preempt_count_sub+0x50/0x80
[   14.518556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.518589]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.518611]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.518634]  kthread+0x337/0x6f0
[   14.518664]  ? trace_preempt_on+0x20/0xc0
[   14.518687]  ? __pfx_kthread+0x10/0x10
[   14.518708]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.518728]  ? calculate_sigpending+0x7b/0xa0
[   14.518752]  ? __pfx_kthread+0x10/0x10
[   14.518773]  ret_from_fork+0x116/0x1d0
[   14.518792]  ? __pfx_kthread+0x10/0x10
[   14.518812]  ret_from_fork_asm+0x1a/0x30
[   14.518842]  </TASK>
[   14.518853] 
[   14.525701] Allocated by task 291:
[   14.525872]  kasan_save_stack+0x45/0x70
[   14.526088]  kasan_save_track+0x18/0x40
[   14.526314]  kasan_save_alloc_info+0x3b/0x50
[   14.526543]  __kasan_kmalloc+0xb7/0xc0
[   14.526762]  __kmalloc_cache_noprof+0x189/0x420
[   14.526978]  kasan_atomics+0x95/0x310
[   14.527162]  kunit_try_run_case+0x1a5/0x480
[   14.527408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.527679]  kthread+0x337/0x6f0
[   14.527822]  ret_from_fork+0x116/0x1d0
[   14.527997]  ret_from_fork_asm+0x1a/0x30
[   14.528216] 
[   14.528281] The buggy address belongs to the object at ffff8881029e2200
[   14.528281]  which belongs to the cache kmalloc-64 of size 64
[   14.528757] The buggy address is located 0 bytes to the right of
[   14.528757]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.529248] 
[   14.529314] The buggy address belongs to the physical page:
[   14.529478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.529711] flags: 0x200000000000000(node=0|zone=2)
[   14.529865] page_type: f5(slab)
[   14.529976] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.530363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.530686] page dumped because: kasan: bad access detected
[   14.530923] 
[   14.531006] Memory state around the buggy address:
[   14.531250]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.531550]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.531758] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.531963]                                      ^
[   14.532111]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.532383]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.532691] ==================================================================
[   14.678490] ==================================================================
[   14.678827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   14.679055] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.679338] 
[   14.679463] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.679509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.679521] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.679543] Call Trace:
[   14.679557]  <TASK>
[   14.679571]  dump_stack_lvl+0x73/0xb0
[   14.679597]  print_report+0xd1/0x650
[   14.679619]  ? __virt_addr_valid+0x1db/0x2d0
[   14.679641]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.679662]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.679688]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.679710]  kasan_report+0x141/0x180
[   14.679731]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.679757]  kasan_check_range+0x10c/0x1c0
[   14.679781]  __kasan_check_write+0x18/0x20
[   14.679804]  kasan_atomics_helper+0x1f43/0x5450
[   14.679827]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.679871]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.679896]  ? kasan_atomics+0x152/0x310
[   14.679921]  kasan_atomics+0x1dc/0x310
[   14.679943]  ? __pfx_kasan_atomics+0x10/0x10
[   14.679966]  ? __pfx_read_tsc+0x10/0x10
[   14.679987]  ? ktime_get_ts64+0x86/0x230
[   14.680012]  kunit_try_run_case+0x1a5/0x480
[   14.680035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.680056]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.680078]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.680100]  ? __kthread_parkme+0x82/0x180
[   14.680121]  ? preempt_count_sub+0x50/0x80
[   14.680144]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.680187]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.680218]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.680242]  kthread+0x337/0x6f0
[   14.680261]  ? trace_preempt_on+0x20/0xc0
[   14.680284]  ? __pfx_kthread+0x10/0x10
[   14.680305]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.680324]  ? calculate_sigpending+0x7b/0xa0
[   14.680348]  ? __pfx_kthread+0x10/0x10
[   14.680369]  ret_from_fork+0x116/0x1d0
[   14.680405]  ? __pfx_kthread+0x10/0x10
[   14.680427]  ret_from_fork_asm+0x1a/0x30
[   14.680457]  </TASK>
[   14.680467] 
[   14.687187] Allocated by task 291:
[   14.687385]  kasan_save_stack+0x45/0x70
[   14.687573]  kasan_save_track+0x18/0x40
[   14.687756]  kasan_save_alloc_info+0x3b/0x50
[   14.687980]  __kasan_kmalloc+0xb7/0xc0
[   14.688151]  __kmalloc_cache_noprof+0x189/0x420
[   14.688379]  kasan_atomics+0x95/0x310
[   14.688511]  kunit_try_run_case+0x1a5/0x480
[   14.688657]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.688904]  kthread+0x337/0x6f0
[   14.689077]  ret_from_fork+0x116/0x1d0
[   14.689240]  ret_from_fork_asm+0x1a/0x30
[   14.689370] 
[   14.689453] The buggy address belongs to the object at ffff8881029e2200
[   14.689453]  which belongs to the cache kmalloc-64 of size 64
[   14.689967] The buggy address is located 0 bytes to the right of
[   14.689967]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.690347] 
[   14.690410] The buggy address belongs to the physical page:
[   14.690619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.690950] flags: 0x200000000000000(node=0|zone=2)
[   14.691185] page_type: f5(slab)
[   14.691349] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.691679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.691996] page dumped because: kasan: bad access detected
[   14.692155] 
[   14.692241] Memory state around the buggy address:
[   14.692435]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.692730]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.692932] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.693131]                                      ^
[   14.693397]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.693729]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.694051] ==================================================================
[   14.610755] ==================================================================
[   14.611414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   14.611761] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.612089] 
[   14.612189] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.612244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.612257] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.612278] Call Trace:
[   14.612292]  <TASK>
[   14.612306]  dump_stack_lvl+0x73/0xb0
[   14.612331]  print_report+0xd1/0x650
[   14.612352]  ? __virt_addr_valid+0x1db/0x2d0
[   14.612374]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.612395]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.612420]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.612442]  kasan_report+0x141/0x180
[   14.612463]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.612489]  kasan_check_range+0x10c/0x1c0
[   14.612512]  __kasan_check_write+0x18/0x20
[   14.612535]  kasan_atomics_helper+0x1ce1/0x5450
[   14.612556]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.612578]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.612603]  ? kasan_atomics+0x152/0x310
[   14.612627]  kasan_atomics+0x1dc/0x310
[   14.612654]  ? __pfx_kasan_atomics+0x10/0x10
[   14.612677]  ? __pfx_read_tsc+0x10/0x10
[   14.612697]  ? ktime_get_ts64+0x86/0x230
[   14.612722]  kunit_try_run_case+0x1a5/0x480
[   14.612744]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.612766]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.612789]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.612810]  ? __kthread_parkme+0x82/0x180
[   14.612830]  ? preempt_count_sub+0x50/0x80
[   14.612854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.612877]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.612899]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.612922]  kthread+0x337/0x6f0
[   14.612941]  ? trace_preempt_on+0x20/0xc0
[   14.612963]  ? __pfx_kthread+0x10/0x10
[   14.612984]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.613004]  ? calculate_sigpending+0x7b/0xa0
[   14.613027]  ? __pfx_kthread+0x10/0x10
[   14.613049]  ret_from_fork+0x116/0x1d0
[   14.613067]  ? __pfx_kthread+0x10/0x10
[   14.613087]  ret_from_fork_asm+0x1a/0x30
[   14.613118]  </TASK>
[   14.613129] 
[   14.620427] Allocated by task 291:
[   14.620545]  kasan_save_stack+0x45/0x70
[   14.620685]  kasan_save_track+0x18/0x40
[   14.620813]  kasan_save_alloc_info+0x3b/0x50
[   14.620964]  __kasan_kmalloc+0xb7/0xc0
[   14.621142]  __kmalloc_cache_noprof+0x189/0x420
[   14.621606]  kasan_atomics+0x95/0x310
[   14.621786]  kunit_try_run_case+0x1a5/0x480
[   14.621981]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.622233]  kthread+0x337/0x6f0
[   14.622550]  ret_from_fork+0x116/0x1d0
[   14.622709]  ret_from_fork_asm+0x1a/0x30
[   14.622841] 
[   14.622903] The buggy address belongs to the object at ffff8881029e2200
[   14.622903]  which belongs to the cache kmalloc-64 of size 64
[   14.623256] The buggy address is located 0 bytes to the right of
[   14.623256]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.623637] 
[   14.623725] The buggy address belongs to the physical page:
[   14.623966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.624334] flags: 0x200000000000000(node=0|zone=2)
[   14.624554] page_type: f5(slab)
[   14.624714] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.625039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.625579] page dumped because: kasan: bad access detected
[   14.625748] 
[   14.625816] Memory state around the buggy address:
[   14.625968]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.626176]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.626493] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.626803]                                      ^
[   14.627021]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.627533]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.627830] ==================================================================
[   14.339162] ==================================================================
[   14.339770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   14.340292] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.340512] 
[   14.340590] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.340635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.340652] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.340674] Call Trace:
[   14.340690]  <TASK>
[   14.340705]  dump_stack_lvl+0x73/0xb0
[   14.340730]  print_report+0xd1/0x650
[   14.340751]  ? __virt_addr_valid+0x1db/0x2d0
[   14.340773]  ? kasan_atomics_helper+0x1467/0x5450
[   14.340794]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.340819]  ? kasan_atomics_helper+0x1467/0x5450
[   14.340841]  kasan_report+0x141/0x180
[   14.340862]  ? kasan_atomics_helper+0x1467/0x5450
[   14.340888]  kasan_check_range+0x10c/0x1c0
[   14.340911]  __kasan_check_write+0x18/0x20
[   14.340934]  kasan_atomics_helper+0x1467/0x5450
[   14.340956]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.340979]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.341004]  ? kasan_atomics+0x152/0x310
[   14.341029]  kasan_atomics+0x1dc/0x310
[   14.341051]  ? __pfx_kasan_atomics+0x10/0x10
[   14.341075]  ? __pfx_read_tsc+0x10/0x10
[   14.341096]  ? ktime_get_ts64+0x86/0x230
[   14.341120]  kunit_try_run_case+0x1a5/0x480
[   14.341142]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.341191]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.341223]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.341245]  ? __kthread_parkme+0x82/0x180
[   14.341266]  ? preempt_count_sub+0x50/0x80
[   14.341299]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.341322]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.341345]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.341379]  kthread+0x337/0x6f0
[   14.341399]  ? trace_preempt_on+0x20/0xc0
[   14.341422]  ? __pfx_kthread+0x10/0x10
[   14.341444]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.341472]  ? calculate_sigpending+0x7b/0xa0
[   14.341496]  ? __pfx_kthread+0x10/0x10
[   14.341517]  ret_from_fork+0x116/0x1d0
[   14.341546]  ? __pfx_kthread+0x10/0x10
[   14.341569]  ret_from_fork_asm+0x1a/0x30
[   14.341602]  </TASK>
[   14.341613] 
[   14.351760] Allocated by task 291:
[   14.351941]  kasan_save_stack+0x45/0x70
[   14.352154]  kasan_save_track+0x18/0x40
[   14.352341]  kasan_save_alloc_info+0x3b/0x50
[   14.352536]  __kasan_kmalloc+0xb7/0xc0
[   14.352718]  __kmalloc_cache_noprof+0x189/0x420
[   14.352890]  kasan_atomics+0x95/0x310
[   14.353016]  kunit_try_run_case+0x1a5/0x480
[   14.353154]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.353428]  kthread+0x337/0x6f0
[   14.353587]  ret_from_fork+0x116/0x1d0
[   14.353762]  ret_from_fork_asm+0x1a/0x30
[   14.353944] 
[   14.354106] The buggy address belongs to the object at ffff8881029e2200
[   14.354106]  which belongs to the cache kmalloc-64 of size 64
[   14.354502] The buggy address is located 0 bytes to the right of
[   14.354502]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.354997] 
[   14.355084] The buggy address belongs to the physical page:
[   14.355547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.355855] flags: 0x200000000000000(node=0|zone=2)
[   14.356088] page_type: f5(slab)
[   14.356314] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.356621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.356886] page dumped because: kasan: bad access detected
[   14.357144] 
[   14.357270] Memory state around the buggy address:
[   14.357467]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.357761]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.358031] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.358253]                                      ^
[   14.358401]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.358728]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.359034] ==================================================================
[   13.968334] ==================================================================
[   13.969451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   13.969797] Read of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   13.970248] 
[   13.970339] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.970386] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.970398] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.970420] Call Trace:
[   13.970434]  <TASK>
[   13.970448]  dump_stack_lvl+0x73/0xb0
[   13.970474]  print_report+0xd1/0x650
[   13.970495]  ? __virt_addr_valid+0x1db/0x2d0
[   13.970517]  ? kasan_atomics_helper+0x4a84/0x5450
[   13.970538]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.970563]  ? kasan_atomics_helper+0x4a84/0x5450
[   13.970585]  kasan_report+0x141/0x180
[   13.970608]  ? kasan_atomics_helper+0x4a84/0x5450
[   13.970633]  __asan_report_load4_noabort+0x18/0x20
[   13.970657]  kasan_atomics_helper+0x4a84/0x5450
[   13.970679]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.970702]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.970727]  ? kasan_atomics+0x152/0x310
[   13.970752]  kasan_atomics+0x1dc/0x310
[   13.970774]  ? __pfx_kasan_atomics+0x10/0x10
[   13.970798]  ? __pfx_read_tsc+0x10/0x10
[   13.970819]  ? ktime_get_ts64+0x86/0x230
[   13.970844]  kunit_try_run_case+0x1a5/0x480
[   13.970867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.970889]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.970911]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.970933]  ? __kthread_parkme+0x82/0x180
[   13.970952]  ? preempt_count_sub+0x50/0x80
[   13.970976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.970998]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.971082]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.971109]  kthread+0x337/0x6f0
[   13.971130]  ? trace_preempt_on+0x20/0xc0
[   13.971153]  ? __pfx_kthread+0x10/0x10
[   13.971175]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.971195]  ? calculate_sigpending+0x7b/0xa0
[   13.971231]  ? __pfx_kthread+0x10/0x10
[   13.971253]  ret_from_fork+0x116/0x1d0
[   13.971273]  ? __pfx_kthread+0x10/0x10
[   13.971294]  ret_from_fork_asm+0x1a/0x30
[   13.971324]  </TASK>
[   13.971335] 
[   13.978179] Allocated by task 291:
[   13.978352]  kasan_save_stack+0x45/0x70
[   13.978534]  kasan_save_track+0x18/0x40
[   13.978691]  kasan_save_alloc_info+0x3b/0x50
[   13.978857]  __kasan_kmalloc+0xb7/0xc0
[   13.978987]  __kmalloc_cache_noprof+0x189/0x420
[   13.979136]  kasan_atomics+0x95/0x310
[   13.979291]  kunit_try_run_case+0x1a5/0x480
[   13.979490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.979735]  kthread+0x337/0x6f0
[   13.980068]  ret_from_fork+0x116/0x1d0
[   13.980325]  ret_from_fork_asm+0x1a/0x30
[   13.980460] 
[   13.980524] The buggy address belongs to the object at ffff8881029e2200
[   13.980524]  which belongs to the cache kmalloc-64 of size 64
[   13.980873] The buggy address is located 0 bytes to the right of
[   13.980873]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   13.981390] 
[   13.981482] The buggy address belongs to the physical page:
[   13.981722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   13.982040] flags: 0x200000000000000(node=0|zone=2)
[   13.982196] page_type: f5(slab)
[   13.982423] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.982749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.983031] page dumped because: kasan: bad access detected
[   13.983801] 
[   13.983903] Memory state around the buggy address:
[   13.984453]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.984792]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.985020] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.985372]                                      ^
[   13.985586]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.985828]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.986126] ==================================================================
[   14.285907] ==================================================================
[   14.286276] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   14.286778] Read of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.287034] 
[   14.287110] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.287155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.287167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.287188] Call Trace:
[   14.287202]  <TASK>
[   14.287227]  dump_stack_lvl+0x73/0xb0
[   14.287251]  print_report+0xd1/0x650
[   14.287273]  ? __virt_addr_valid+0x1db/0x2d0
[   14.287295]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.287315]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.287341]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.287362]  kasan_report+0x141/0x180
[   14.287383]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.287409]  kasan_check_range+0x10c/0x1c0
[   14.287432]  __kasan_check_read+0x15/0x20
[   14.287455]  kasan_atomics_helper+0x13b5/0x5450
[   14.287476]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.287498]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.287522]  ? kasan_atomics+0x152/0x310
[   14.287548]  kasan_atomics+0x1dc/0x310
[   14.287569]  ? __pfx_kasan_atomics+0x10/0x10
[   14.287592]  ? __pfx_read_tsc+0x10/0x10
[   14.287613]  ? ktime_get_ts64+0x86/0x230
[   14.287638]  kunit_try_run_case+0x1a5/0x480
[   14.287660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.287682]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.287705]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.287727]  ? __kthread_parkme+0x82/0x180
[   14.287747]  ? preempt_count_sub+0x50/0x80
[   14.287769]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.287793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.287816]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.287839]  kthread+0x337/0x6f0
[   14.287859]  ? trace_preempt_on+0x20/0xc0
[   14.287881]  ? __pfx_kthread+0x10/0x10
[   14.287902]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.287922]  ? calculate_sigpending+0x7b/0xa0
[   14.287945]  ? __pfx_kthread+0x10/0x10
[   14.287967]  ret_from_fork+0x116/0x1d0
[   14.287986]  ? __pfx_kthread+0x10/0x10
[   14.288006]  ret_from_fork_asm+0x1a/0x30
[   14.288036]  </TASK>
[   14.288046] 
[   14.298519] Allocated by task 291:
[   14.298868]  kasan_save_stack+0x45/0x70
[   14.299280]  kasan_save_track+0x18/0x40
[   14.299647]  kasan_save_alloc_info+0x3b/0x50
[   14.300049]  __kasan_kmalloc+0xb7/0xc0
[   14.300436]  __kmalloc_cache_noprof+0x189/0x420
[   14.300869]  kasan_atomics+0x95/0x310
[   14.301254]  kunit_try_run_case+0x1a5/0x480
[   14.301649]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.302131]  kthread+0x337/0x6f0
[   14.302474]  ret_from_fork+0x116/0x1d0
[   14.302796]  ret_from_fork_asm+0x1a/0x30
[   14.302928] 
[   14.302991] The buggy address belongs to the object at ffff8881029e2200
[   14.302991]  which belongs to the cache kmalloc-64 of size 64
[   14.303730] The buggy address is located 0 bytes to the right of
[   14.303730]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.304825] 
[   14.304976] The buggy address belongs to the physical page:
[   14.305430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.305657] flags: 0x200000000000000(node=0|zone=2)
[   14.305810] page_type: f5(slab)
[   14.305921] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.306138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.306823] page dumped because: kasan: bad access detected
[   14.307322] 
[   14.307469] Memory state around the buggy address:
[   14.307898]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.308529]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.309138] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.309756]                                      ^
[   14.310195]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.310657]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.311120] ==================================================================
[   14.875752] ==================================================================
[   14.876433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   14.877340] Read of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.878041] 
[   14.878244] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.878291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.878303] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.878324] Call Trace:
[   14.878340]  <TASK>
[   14.878355]  dump_stack_lvl+0x73/0xb0
[   14.878381]  print_report+0xd1/0x650
[   14.878402]  ? __virt_addr_valid+0x1db/0x2d0
[   14.878425]  ? kasan_atomics_helper+0x5115/0x5450
[   14.878446]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.878472]  ? kasan_atomics_helper+0x5115/0x5450
[   14.878493]  kasan_report+0x141/0x180
[   14.878515]  ? kasan_atomics_helper+0x5115/0x5450
[   14.878541]  __asan_report_load8_noabort+0x18/0x20
[   14.878565]  kasan_atomics_helper+0x5115/0x5450
[   14.878587]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.878609]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.878634]  ? kasan_atomics+0x152/0x310
[   14.878660]  kasan_atomics+0x1dc/0x310
[   14.878682]  ? __pfx_kasan_atomics+0x10/0x10
[   14.878706]  ? __pfx_read_tsc+0x10/0x10
[   14.878727]  ? ktime_get_ts64+0x86/0x230
[   14.878751]  kunit_try_run_case+0x1a5/0x480
[   14.878777]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.878800]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.878823]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.878846]  ? __kthread_parkme+0x82/0x180
[   14.878866]  ? preempt_count_sub+0x50/0x80
[   14.878890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.878914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.878936]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.878960]  kthread+0x337/0x6f0
[   14.878979]  ? trace_preempt_on+0x20/0xc0
[   14.879002]  ? __pfx_kthread+0x10/0x10
[   14.879023]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.879043]  ? calculate_sigpending+0x7b/0xa0
[   14.879067]  ? __pfx_kthread+0x10/0x10
[   14.879089]  ret_from_fork+0x116/0x1d0
[   14.879108]  ? __pfx_kthread+0x10/0x10
[   14.879130]  ret_from_fork_asm+0x1a/0x30
[   14.879160]  </TASK>
[   14.879190] 
[   14.890542] Allocated by task 291:
[   14.890664]  kasan_save_stack+0x45/0x70
[   14.890801]  kasan_save_track+0x18/0x40
[   14.890927]  kasan_save_alloc_info+0x3b/0x50
[   14.891068]  __kasan_kmalloc+0xb7/0xc0
[   14.891276]  __kmalloc_cache_noprof+0x189/0x420
[   14.891660]  kasan_atomics+0x95/0x310
[   14.891971]  kunit_try_run_case+0x1a5/0x480
[   14.892356]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.892808]  kthread+0x337/0x6f0
[   14.893099]  ret_from_fork+0x116/0x1d0
[   14.893455]  ret_from_fork_asm+0x1a/0x30
[   14.893804] 
[   14.893950] The buggy address belongs to the object at ffff8881029e2200
[   14.893950]  which belongs to the cache kmalloc-64 of size 64
[   14.894971] The buggy address is located 0 bytes to the right of
[   14.894971]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.895576] 
[   14.895644] The buggy address belongs to the physical page:
[   14.895810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.896042] flags: 0x200000000000000(node=0|zone=2)
[   14.896293] page_type: f5(slab)
[   14.896575] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.897225] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.897849] page dumped because: kasan: bad access detected
[   14.898350] 
[   14.898497] Memory state around the buggy address:
[   14.898906]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.899518]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.900088] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.900660]                                      ^
[   14.900810]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.901482]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.902074] ==================================================================
[   14.268749] ==================================================================
[   14.269332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   14.269609] Read of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.270177] 
[   14.270303] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.270350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.270364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.270449] Call Trace:
[   14.270467]  <TASK>
[   14.270481]  dump_stack_lvl+0x73/0xb0
[   14.270508]  print_report+0xd1/0x650
[   14.270530]  ? __virt_addr_valid+0x1db/0x2d0
[   14.270553]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.270574]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.270599]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.270621]  kasan_report+0x141/0x180
[   14.270642]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.270668]  __asan_report_load4_noabort+0x18/0x20
[   14.270691]  kasan_atomics_helper+0x49ce/0x5450
[   14.270714]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.270735]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.270759]  ? kasan_atomics+0x152/0x310
[   14.270784]  kasan_atomics+0x1dc/0x310
[   14.270807]  ? __pfx_kasan_atomics+0x10/0x10
[   14.270830]  ? __pfx_read_tsc+0x10/0x10
[   14.270850]  ? ktime_get_ts64+0x86/0x230
[   14.270874]  kunit_try_run_case+0x1a5/0x480
[   14.270897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.270919]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.270941]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.270964]  ? __kthread_parkme+0x82/0x180
[   14.270984]  ? preempt_count_sub+0x50/0x80
[   14.271008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.271032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.271055]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.271077]  kthread+0x337/0x6f0
[   14.271096]  ? trace_preempt_on+0x20/0xc0
[   14.271119]  ? __pfx_kthread+0x10/0x10
[   14.271140]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.271161]  ? calculate_sigpending+0x7b/0xa0
[   14.271184]  ? __pfx_kthread+0x10/0x10
[   14.271216]  ret_from_fork+0x116/0x1d0
[   14.271234]  ? __pfx_kthread+0x10/0x10
[   14.271255]  ret_from_fork_asm+0x1a/0x30
[   14.271285]  </TASK>
[   14.271296] 
[   14.278174] Allocated by task 291:
[   14.278360]  kasan_save_stack+0x45/0x70
[   14.278497]  kasan_save_track+0x18/0x40
[   14.278625]  kasan_save_alloc_info+0x3b/0x50
[   14.278766]  __kasan_kmalloc+0xb7/0xc0
[   14.278890]  __kmalloc_cache_noprof+0x189/0x420
[   14.279255]  kasan_atomics+0x95/0x310
[   14.279436]  kunit_try_run_case+0x1a5/0x480
[   14.279637]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.279880]  kthread+0x337/0x6f0
[   14.280039]  ret_from_fork+0x116/0x1d0
[   14.280197]  ret_from_fork_asm+0x1a/0x30
[   14.280341] 
[   14.280405] The buggy address belongs to the object at ffff8881029e2200
[   14.280405]  which belongs to the cache kmalloc-64 of size 64
[   14.280807] The buggy address is located 0 bytes to the right of
[   14.280807]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.281561] 
[   14.281653] The buggy address belongs to the physical page:
[   14.281893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.282126] flags: 0x200000000000000(node=0|zone=2)
[   14.282578] page_type: f5(slab)
[   14.282742] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.283037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.283364] page dumped because: kasan: bad access detected
[   14.283531] 
[   14.283596] Memory state around the buggy address:
[   14.283808]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.284116]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.284429] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.284637]                                      ^
[   14.284787]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.284995]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.285396] ==================================================================
[   14.115283] ==================================================================
[   14.115698] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   14.116057] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.116730] 
[   14.116958] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.117003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.117017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.117050] Call Trace:
[   14.117066]  <TASK>
[   14.117081]  dump_stack_lvl+0x73/0xb0
[   14.117107]  print_report+0xd1/0x650
[   14.117128]  ? __virt_addr_valid+0x1db/0x2d0
[   14.117151]  ? kasan_atomics_helper+0x1079/0x5450
[   14.117171]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.117198]  ? kasan_atomics_helper+0x1079/0x5450
[   14.117238]  kasan_report+0x141/0x180
[   14.117260]  ? kasan_atomics_helper+0x1079/0x5450
[   14.117285]  kasan_check_range+0x10c/0x1c0
[   14.117327]  __kasan_check_write+0x18/0x20
[   14.117350]  kasan_atomics_helper+0x1079/0x5450
[   14.117372]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.117404]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.117428]  ? kasan_atomics+0x152/0x310
[   14.117453]  kasan_atomics+0x1dc/0x310
[   14.117476]  ? __pfx_kasan_atomics+0x10/0x10
[   14.117500]  ? __pfx_read_tsc+0x10/0x10
[   14.117520]  ? ktime_get_ts64+0x86/0x230
[   14.117544]  kunit_try_run_case+0x1a5/0x480
[   14.117567]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.117589]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.117612]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.117634]  ? __kthread_parkme+0x82/0x180
[   14.117654]  ? preempt_count_sub+0x50/0x80
[   14.117677]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.117701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.117723]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.117746]  kthread+0x337/0x6f0
[   14.117765]  ? trace_preempt_on+0x20/0xc0
[   14.117788]  ? __pfx_kthread+0x10/0x10
[   14.117809]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.117829]  ? calculate_sigpending+0x7b/0xa0
[   14.117853]  ? __pfx_kthread+0x10/0x10
[   14.117875]  ret_from_fork+0x116/0x1d0
[   14.117893]  ? __pfx_kthread+0x10/0x10
[   14.117913]  ret_from_fork_asm+0x1a/0x30
[   14.117944]  </TASK>
[   14.117954] 
[   14.128170] Allocated by task 291:
[   14.128317]  kasan_save_stack+0x45/0x70
[   14.128493]  kasan_save_track+0x18/0x40
[   14.128622]  kasan_save_alloc_info+0x3b/0x50
[   14.128766]  __kasan_kmalloc+0xb7/0xc0
[   14.128891]  __kmalloc_cache_noprof+0x189/0x420
[   14.129100]  kasan_atomics+0x95/0x310
[   14.129303]  kunit_try_run_case+0x1a5/0x480
[   14.129501]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.129740]  kthread+0x337/0x6f0
[   14.129947]  ret_from_fork+0x116/0x1d0
[   14.130124]  ret_from_fork_asm+0x1a/0x30
[   14.130334] 
[   14.130420] The buggy address belongs to the object at ffff8881029e2200
[   14.130420]  which belongs to the cache kmalloc-64 of size 64
[   14.130806] The buggy address is located 0 bytes to the right of
[   14.130806]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.131563] 
[   14.131636] The buggy address belongs to the physical page:
[   14.131877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.132218] flags: 0x200000000000000(node=0|zone=2)
[   14.132463] page_type: f5(slab)
[   14.132636] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.132950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.133282] page dumped because: kasan: bad access detected
[   14.133589] 
[   14.133689] Memory state around the buggy address:
[   14.133891]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.134201]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.134485] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.134693]                                      ^
[   14.134883]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.135198]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.135471] ==================================================================
[   14.628338] ==================================================================
[   14.628652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   14.628880] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.629104] 
[   14.629235] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.629280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.629292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.629314] Call Trace:
[   14.629328]  <TASK>
[   14.629343]  dump_stack_lvl+0x73/0xb0
[   14.629367]  print_report+0xd1/0x650
[   14.629389]  ? __virt_addr_valid+0x1db/0x2d0
[   14.629411]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.629432]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.629457]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.629479]  kasan_report+0x141/0x180
[   14.629501]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.629526]  kasan_check_range+0x10c/0x1c0
[   14.629549]  __kasan_check_write+0x18/0x20
[   14.629572]  kasan_atomics_helper+0x1d7a/0x5450
[   14.629594]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.629616]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.629640]  ? kasan_atomics+0x152/0x310
[   14.629665]  kasan_atomics+0x1dc/0x310
[   14.629687]  ? __pfx_kasan_atomics+0x10/0x10
[   14.629711]  ? __pfx_read_tsc+0x10/0x10
[   14.629732]  ? ktime_get_ts64+0x86/0x230
[   14.629756]  kunit_try_run_case+0x1a5/0x480
[   14.629780]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.629801]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.629823]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.629845]  ? __kthread_parkme+0x82/0x180
[   14.629866]  ? preempt_count_sub+0x50/0x80
[   14.629888]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.629911]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.629934]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.629957]  kthread+0x337/0x6f0
[   14.629976]  ? trace_preempt_on+0x20/0xc0
[   14.629999]  ? __pfx_kthread+0x10/0x10
[   14.630020]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.630040]  ? calculate_sigpending+0x7b/0xa0
[   14.630063]  ? __pfx_kthread+0x10/0x10
[   14.630085]  ret_from_fork+0x116/0x1d0
[   14.630104]  ? __pfx_kthread+0x10/0x10
[   14.630124]  ret_from_fork_asm+0x1a/0x30
[   14.630154]  </TASK>
[   14.630164] 
[   14.637202] Allocated by task 291:
[   14.637431]  kasan_save_stack+0x45/0x70
[   14.637614]  kasan_save_track+0x18/0x40
[   14.637792]  kasan_save_alloc_info+0x3b/0x50
[   14.637986]  __kasan_kmalloc+0xb7/0xc0
[   14.638136]  __kmalloc_cache_noprof+0x189/0x420
[   14.638297]  kasan_atomics+0x95/0x310
[   14.638419]  kunit_try_run_case+0x1a5/0x480
[   14.638551]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.638711]  kthread+0x337/0x6f0
[   14.638857]  ret_from_fork+0x116/0x1d0
[   14.639046]  ret_from_fork_asm+0x1a/0x30
[   14.639246] 
[   14.639325] The buggy address belongs to the object at ffff8881029e2200
[   14.639325]  which belongs to the cache kmalloc-64 of size 64
[   14.639780] The buggy address is located 0 bytes to the right of
[   14.639780]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.640329] 
[   14.640395] The buggy address belongs to the physical page:
[   14.640635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.640902] flags: 0x200000000000000(node=0|zone=2)
[   14.641054] page_type: f5(slab)
[   14.641184] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.641531] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.641848] page dumped because: kasan: bad access detected
[   14.642087] 
[   14.642197] Memory state around the buggy address:
[   14.642397]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.642601]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.642907] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.643272]                                      ^
[   14.643452]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.643654]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.643852] ==================================================================
[   14.482600] ==================================================================
[   14.483141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   14.483547] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.483901] 
[   14.484000] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.484054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.484066] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.484088] Call Trace:
[   14.484102]  <TASK>
[   14.484126]  dump_stack_lvl+0x73/0xb0
[   14.484153]  print_report+0xd1/0x650
[   14.484193]  ? __virt_addr_valid+0x1db/0x2d0
[   14.484234]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.484255]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.484280]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.484312]  kasan_report+0x141/0x180
[   14.484334]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.484360]  kasan_check_range+0x10c/0x1c0
[   14.484383]  __kasan_check_write+0x18/0x20
[   14.484415]  kasan_atomics_helper+0x18b1/0x5450
[   14.484439]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.484463]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.484498]  ? kasan_atomics+0x152/0x310
[   14.484524]  kasan_atomics+0x1dc/0x310
[   14.484546]  ? __pfx_kasan_atomics+0x10/0x10
[   14.484580]  ? __pfx_read_tsc+0x10/0x10
[   14.484601]  ? ktime_get_ts64+0x86/0x230
[   14.484626]  kunit_try_run_case+0x1a5/0x480
[   14.484663]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.484684]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.484707]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.484729]  ? __kthread_parkme+0x82/0x180
[   14.484750]  ? preempt_count_sub+0x50/0x80
[   14.484773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.484796]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.484818]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.484842]  kthread+0x337/0x6f0
[   14.484861]  ? trace_preempt_on+0x20/0xc0
[   14.484884]  ? __pfx_kthread+0x10/0x10
[   14.484905]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.484925]  ? calculate_sigpending+0x7b/0xa0
[   14.484949]  ? __pfx_kthread+0x10/0x10
[   14.484970]  ret_from_fork+0x116/0x1d0
[   14.484988]  ? __pfx_kthread+0x10/0x10
[   14.485009]  ret_from_fork_asm+0x1a/0x30
[   14.485039]  </TASK>
[   14.485050] 
[   14.492116] Allocated by task 291:
[   14.492311]  kasan_save_stack+0x45/0x70
[   14.492500]  kasan_save_track+0x18/0x40
[   14.492698]  kasan_save_alloc_info+0x3b/0x50
[   14.492880]  __kasan_kmalloc+0xb7/0xc0
[   14.493074]  __kmalloc_cache_noprof+0x189/0x420
[   14.493307]  kasan_atomics+0x95/0x310
[   14.493488]  kunit_try_run_case+0x1a5/0x480
[   14.493646]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.493900]  kthread+0x337/0x6f0
[   14.494053]  ret_from_fork+0x116/0x1d0
[   14.494223]  ret_from_fork_asm+0x1a/0x30
[   14.494359] 
[   14.494422] The buggy address belongs to the object at ffff8881029e2200
[   14.494422]  which belongs to the cache kmalloc-64 of size 64
[   14.494763] The buggy address is located 0 bytes to the right of
[   14.494763]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.495227] 
[   14.495326] The buggy address belongs to the physical page:
[   14.495612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.496011] flags: 0x200000000000000(node=0|zone=2)
[   14.496294] page_type: f5(slab)
[   14.496452] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.496779] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.497084] page dumped because: kasan: bad access detected
[   14.497321] 
[   14.497420] Memory state around the buggy address:
[   14.497639]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.497955]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.498288] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.498499]                                      ^
[   14.498647]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.498873]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.499226] ==================================================================
[   14.085965] ==================================================================
[   14.086765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   14.087461] Read of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.087750] 
[   14.087923] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.087970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.087983] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.088005] Call Trace:
[   14.088022]  <TASK>
[   14.088037]  dump_stack_lvl+0x73/0xb0
[   14.088064]  print_report+0xd1/0x650
[   14.088085]  ? __virt_addr_valid+0x1db/0x2d0
[   14.088107]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.088155]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.088181]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.088212]  kasan_report+0x141/0x180
[   14.088234]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.088260]  __asan_report_load4_noabort+0x18/0x20
[   14.088284]  kasan_atomics_helper+0x4a36/0x5450
[   14.088306]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.088328]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.088361]  ? kasan_atomics+0x152/0x310
[   14.088388]  kasan_atomics+0x1dc/0x310
[   14.088416]  ? __pfx_kasan_atomics+0x10/0x10
[   14.088440]  ? __pfx_read_tsc+0x10/0x10
[   14.088460]  ? ktime_get_ts64+0x86/0x230
[   14.088486]  kunit_try_run_case+0x1a5/0x480
[   14.088508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.088531]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.088553]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.088576]  ? __kthread_parkme+0x82/0x180
[   14.088597]  ? preempt_count_sub+0x50/0x80
[   14.088621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.088644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.088671]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.088695]  kthread+0x337/0x6f0
[   14.088715]  ? trace_preempt_on+0x20/0xc0
[   14.088738]  ? __pfx_kthread+0x10/0x10
[   14.088759]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.088780]  ? calculate_sigpending+0x7b/0xa0
[   14.088803]  ? __pfx_kthread+0x10/0x10
[   14.088825]  ret_from_fork+0x116/0x1d0
[   14.088844]  ? __pfx_kthread+0x10/0x10
[   14.088865]  ret_from_fork_asm+0x1a/0x30
[   14.088895]  </TASK>
[   14.088906] 
[   14.101771] Allocated by task 291:
[   14.102027]  kasan_save_stack+0x45/0x70
[   14.102318]  kasan_save_track+0x18/0x40
[   14.102450]  kasan_save_alloc_info+0x3b/0x50
[   14.102592]  __kasan_kmalloc+0xb7/0xc0
[   14.102717]  __kmalloc_cache_noprof+0x189/0x420
[   14.102864]  kasan_atomics+0x95/0x310
[   14.102988]  kunit_try_run_case+0x1a5/0x480
[   14.103125]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.103564]  kthread+0x337/0x6f0
[   14.103857]  ret_from_fork+0x116/0x1d0
[   14.104232]  ret_from_fork_asm+0x1a/0x30
[   14.104594] 
[   14.104745] The buggy address belongs to the object at ffff8881029e2200
[   14.104745]  which belongs to the cache kmalloc-64 of size 64
[   14.105862] The buggy address is located 0 bytes to the right of
[   14.105862]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.107253] 
[   14.107412] The buggy address belongs to the physical page:
[   14.107934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.108693] flags: 0x200000000000000(node=0|zone=2)
[   14.109127] page_type: f5(slab)
[   14.109461] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.109888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.110109] page dumped because: kasan: bad access detected
[   14.110532] 
[   14.110699] Memory state around the buggy address:
[   14.111112]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.111822]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.112599] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.112997]                                      ^
[   14.113145]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.113730]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.114409] ==================================================================
[   14.410341] ==================================================================
[   14.410705] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   14.411034] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.411301] 
[   14.411377] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.411422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.411435] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.411456] Call Trace:
[   14.411470]  <TASK>
[   14.411485]  dump_stack_lvl+0x73/0xb0
[   14.411509]  print_report+0xd1/0x650
[   14.411531]  ? __virt_addr_valid+0x1db/0x2d0
[   14.411553]  ? kasan_atomics_helper+0x164f/0x5450
[   14.411574]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.411600]  ? kasan_atomics_helper+0x164f/0x5450
[   14.411621]  kasan_report+0x141/0x180
[   14.411643]  ? kasan_atomics_helper+0x164f/0x5450
[   14.411668]  kasan_check_range+0x10c/0x1c0
[   14.411692]  __kasan_check_write+0x18/0x20
[   14.411716]  kasan_atomics_helper+0x164f/0x5450
[   14.411738]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.411760]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.411783]  ? kasan_atomics+0x152/0x310
[   14.411809]  kasan_atomics+0x1dc/0x310
[   14.411831]  ? __pfx_kasan_atomics+0x10/0x10
[   14.411855]  ? __pfx_read_tsc+0x10/0x10
[   14.411876]  ? ktime_get_ts64+0x86/0x230
[   14.411900]  kunit_try_run_case+0x1a5/0x480
[   14.411935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.411957]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.411979]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.412021]  ? __kthread_parkme+0x82/0x180
[   14.412042]  ? preempt_count_sub+0x50/0x80
[   14.412067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.412102]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.412125]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.412149]  kthread+0x337/0x6f0
[   14.412186]  ? trace_preempt_on+0x20/0xc0
[   14.412217]  ? __pfx_kthread+0x10/0x10
[   14.412239]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.412259]  ? calculate_sigpending+0x7b/0xa0
[   14.412283]  ? __pfx_kthread+0x10/0x10
[   14.412305]  ret_from_fork+0x116/0x1d0
[   14.412332]  ? __pfx_kthread+0x10/0x10
[   14.412353]  ret_from_fork_asm+0x1a/0x30
[   14.412394]  </TASK>
[   14.412405] 
[   14.419824] Allocated by task 291:
[   14.419986]  kasan_save_stack+0x45/0x70
[   14.420221]  kasan_save_track+0x18/0x40
[   14.420393]  kasan_save_alloc_info+0x3b/0x50
[   14.420563]  __kasan_kmalloc+0xb7/0xc0
[   14.420693]  __kmalloc_cache_noprof+0x189/0x420
[   14.420841]  kasan_atomics+0x95/0x310
[   14.420966]  kunit_try_run_case+0x1a5/0x480
[   14.421103]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.421304]  kthread+0x337/0x6f0
[   14.421420]  ret_from_fork+0x116/0x1d0
[   14.421545]  ret_from_fork_asm+0x1a/0x30
[   14.421754] 
[   14.421840] The buggy address belongs to the object at ffff8881029e2200
[   14.421840]  which belongs to the cache kmalloc-64 of size 64
[   14.422377] The buggy address is located 0 bytes to the right of
[   14.422377]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.422903] 
[   14.422988] The buggy address belongs to the physical page:
[   14.423261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.423604] flags: 0x200000000000000(node=0|zone=2)
[   14.423852] page_type: f5(slab)
[   14.424008] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.424371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.424641] page dumped because: kasan: bad access detected
[   14.424809] 
[   14.424870] Memory state around the buggy address:
[   14.425016]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.425278]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.425597] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.425915]                                      ^
[   14.426135]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.426457]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.426770] ==================================================================
[   14.847252] ==================================================================
[   14.847947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   14.848631] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.849309] 
[   14.849484] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.849539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.849552] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.849574] Call Trace:
[   14.849601]  <TASK>
[   14.849617]  dump_stack_lvl+0x73/0xb0
[   14.849643]  print_report+0xd1/0x650
[   14.849665]  ? __virt_addr_valid+0x1db/0x2d0
[   14.849687]  ? kasan_atomics_helper+0x224c/0x5450
[   14.849708]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.849734]  ? kasan_atomics_helper+0x224c/0x5450
[   14.849756]  kasan_report+0x141/0x180
[   14.849778]  ? kasan_atomics_helper+0x224c/0x5450
[   14.849812]  kasan_check_range+0x10c/0x1c0
[   14.849836]  __kasan_check_write+0x18/0x20
[   14.849859]  kasan_atomics_helper+0x224c/0x5450
[   14.849892]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.849914]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.849938]  ? kasan_atomics+0x152/0x310
[   14.849963]  kasan_atomics+0x1dc/0x310
[   14.849986]  ? __pfx_kasan_atomics+0x10/0x10
[   14.850010]  ? __pfx_read_tsc+0x10/0x10
[   14.850030]  ? ktime_get_ts64+0x86/0x230
[   14.850055]  kunit_try_run_case+0x1a5/0x480
[   14.850078]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.850099]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.850121]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.850144]  ? __kthread_parkme+0x82/0x180
[   14.850183]  ? preempt_count_sub+0x50/0x80
[   14.850218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.850241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.850264]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.850288]  kthread+0x337/0x6f0
[   14.850307]  ? trace_preempt_on+0x20/0xc0
[   14.850331]  ? __pfx_kthread+0x10/0x10
[   14.850351]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.850373]  ? calculate_sigpending+0x7b/0xa0
[   14.850398]  ? __pfx_kthread+0x10/0x10
[   14.850419]  ret_from_fork+0x116/0x1d0
[   14.850438]  ? __pfx_kthread+0x10/0x10
[   14.850459]  ret_from_fork_asm+0x1a/0x30
[   14.850489]  </TASK>
[   14.850499] 
[   14.863191] Allocated by task 291:
[   14.863531]  kasan_save_stack+0x45/0x70
[   14.863734]  kasan_save_track+0x18/0x40
[   14.864109]  kasan_save_alloc_info+0x3b/0x50
[   14.864312]  __kasan_kmalloc+0xb7/0xc0
[   14.864673]  __kmalloc_cache_noprof+0x189/0x420
[   14.865076]  kasan_atomics+0x95/0x310
[   14.865328]  kunit_try_run_case+0x1a5/0x480
[   14.865722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.865906]  kthread+0x337/0x6f0
[   14.866283]  ret_from_fork+0x116/0x1d0
[   14.866623]  ret_from_fork_asm+0x1a/0x30
[   14.866788] 
[   14.866919] The buggy address belongs to the object at ffff8881029e2200
[   14.866919]  which belongs to the cache kmalloc-64 of size 64
[   14.867612] The buggy address is located 0 bytes to the right of
[   14.867612]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.867972] 
[   14.868036] The buggy address belongs to the physical page:
[   14.868318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.868987] flags: 0x200000000000000(node=0|zone=2)
[   14.869458] page_type: f5(slab)
[   14.869745] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.870428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.871075] page dumped because: kasan: bad access detected
[   14.871580] 
[   14.871730] Memory state around the buggy address:
[   14.872141]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.872526]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.872742] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.872949]                                      ^
[   14.873099]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.873677]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.874313] ==================================================================
[   14.499749] ==================================================================
[   14.500272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   14.500751] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.500969] 
[   14.501044] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.501089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.501101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.501123] Call Trace:
[   14.501135]  <TASK>
[   14.501148]  dump_stack_lvl+0x73/0xb0
[   14.501195]  print_report+0xd1/0x650
[   14.501226]  ? __virt_addr_valid+0x1db/0x2d0
[   14.501247]  ? kasan_atomics_helper+0x194a/0x5450
[   14.501268]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.501294]  ? kasan_atomics_helper+0x194a/0x5450
[   14.501315]  kasan_report+0x141/0x180
[   14.501340]  ? kasan_atomics_helper+0x194a/0x5450
[   14.501377]  kasan_check_range+0x10c/0x1c0
[   14.501402]  __kasan_check_write+0x18/0x20
[   14.501425]  kasan_atomics_helper+0x194a/0x5450
[   14.501458]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.501480]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.501504]  ? kasan_atomics+0x152/0x310
[   14.501528]  kasan_atomics+0x1dc/0x310
[   14.501551]  ? __pfx_kasan_atomics+0x10/0x10
[   14.501575]  ? __pfx_read_tsc+0x10/0x10
[   14.501596]  ? ktime_get_ts64+0x86/0x230
[   14.501620]  kunit_try_run_case+0x1a5/0x480
[   14.501643]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.501666]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.501688]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.501710]  ? __kthread_parkme+0x82/0x180
[   14.501731]  ? preempt_count_sub+0x50/0x80
[   14.501753]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.501776]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.501799]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.501822]  kthread+0x337/0x6f0
[   14.501842]  ? trace_preempt_on+0x20/0xc0
[   14.501864]  ? __pfx_kthread+0x10/0x10
[   14.501884]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.501905]  ? calculate_sigpending+0x7b/0xa0
[   14.501929]  ? __pfx_kthread+0x10/0x10
[   14.501950]  ret_from_fork+0x116/0x1d0
[   14.501968]  ? __pfx_kthread+0x10/0x10
[   14.501989]  ret_from_fork_asm+0x1a/0x30
[   14.502019]  </TASK>
[   14.502030] 
[   14.509277] Allocated by task 291:
[   14.509445]  kasan_save_stack+0x45/0x70
[   14.509654]  kasan_save_track+0x18/0x40
[   14.509820]  kasan_save_alloc_info+0x3b/0x50
[   14.510031]  __kasan_kmalloc+0xb7/0xc0
[   14.510162]  __kmalloc_cache_noprof+0x189/0x420
[   14.510338]  kasan_atomics+0x95/0x310
[   14.510465]  kunit_try_run_case+0x1a5/0x480
[   14.510605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.510777]  kthread+0x337/0x6f0
[   14.510893]  ret_from_fork+0x116/0x1d0
[   14.511035]  ret_from_fork_asm+0x1a/0x30
[   14.511278] 
[   14.511365] The buggy address belongs to the object at ffff8881029e2200
[   14.511365]  which belongs to the cache kmalloc-64 of size 64
[   14.511870] The buggy address is located 0 bytes to the right of
[   14.511870]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.512391] 
[   14.512456] The buggy address belongs to the physical page:
[   14.512621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.512857] flags: 0x200000000000000(node=0|zone=2)
[   14.513010] page_type: f5(slab)
[   14.513123] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.513471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.513813] page dumped because: kasan: bad access detected
[   14.514083] 
[   14.514214] Memory state around the buggy address:
[   14.514465]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.514813]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.515155] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.515488]                                      ^
[   14.515722]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.516012]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.516247] ==================================================================
[   14.003187] ==================================================================
[   14.003530] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   14.004124] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.004453] 
[   14.004531] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.004578] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.004591] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.004612] Call Trace:
[   14.004626]  <TASK>
[   14.004639]  dump_stack_lvl+0x73/0xb0
[   14.004669]  print_report+0xd1/0x650
[   14.004691]  ? __virt_addr_valid+0x1db/0x2d0
[   14.004713]  ? kasan_atomics_helper+0xde0/0x5450
[   14.004735]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.004761]  ? kasan_atomics_helper+0xde0/0x5450
[   14.004782]  kasan_report+0x141/0x180
[   14.004805]  ? kasan_atomics_helper+0xde0/0x5450
[   14.004830]  kasan_check_range+0x10c/0x1c0
[   14.004853]  __kasan_check_write+0x18/0x20
[   14.004876]  kasan_atomics_helper+0xde0/0x5450
[   14.004898]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.004920]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.004945]  ? kasan_atomics+0x152/0x310
[   14.004970]  kasan_atomics+0x1dc/0x310
[   14.004994]  ? __pfx_kasan_atomics+0x10/0x10
[   14.005018]  ? __pfx_read_tsc+0x10/0x10
[   14.005039]  ? ktime_get_ts64+0x86/0x230
[   14.005063]  kunit_try_run_case+0x1a5/0x480
[   14.005086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.005108]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.005130]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.005153]  ? __kthread_parkme+0x82/0x180
[   14.005173]  ? preempt_count_sub+0x50/0x80
[   14.005196]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.005230]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.005252]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.005275]  kthread+0x337/0x6f0
[   14.005295]  ? trace_preempt_on+0x20/0xc0
[   14.005316]  ? __pfx_kthread+0x10/0x10
[   14.005337]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.005358]  ? calculate_sigpending+0x7b/0xa0
[   14.005381]  ? __pfx_kthread+0x10/0x10
[   14.005402]  ret_from_fork+0x116/0x1d0
[   14.005421]  ? __pfx_kthread+0x10/0x10
[   14.005440]  ret_from_fork_asm+0x1a/0x30
[   14.005471]  </TASK>
[   14.005481] 
[   14.013280] Allocated by task 291:
[   14.013457]  kasan_save_stack+0x45/0x70
[   14.013628]  kasan_save_track+0x18/0x40
[   14.013787]  kasan_save_alloc_info+0x3b/0x50
[   14.013928]  __kasan_kmalloc+0xb7/0xc0
[   14.014100]  __kmalloc_cache_noprof+0x189/0x420
[   14.014485]  kasan_atomics+0x95/0x310
[   14.014655]  kunit_try_run_case+0x1a5/0x480
[   14.014817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.015048]  kthread+0x337/0x6f0
[   14.015191]  ret_from_fork+0x116/0x1d0
[   14.015335]  ret_from_fork_asm+0x1a/0x30
[   14.015489] 
[   14.015577] The buggy address belongs to the object at ffff8881029e2200
[   14.015577]  which belongs to the cache kmalloc-64 of size 64
[   14.016009] The buggy address is located 0 bytes to the right of
[   14.016009]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.016553] 
[   14.016638] The buggy address belongs to the physical page:
[   14.016806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.017038] flags: 0x200000000000000(node=0|zone=2)
[   14.017192] page_type: f5(slab)
[   14.017313] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.017537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.017758] page dumped because: kasan: bad access detected
[   14.017922] 
[   14.017984] Memory state around the buggy address:
[   14.018196]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.018887]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.019201] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.019509]                                      ^
[   14.019719]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.019977]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.020188] ==================================================================
[   14.466049] ==================================================================
[   14.466370] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   14.466733] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.467025] 
[   14.467123] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.467192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.467220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.467240] Call Trace:
[   14.467254]  <TASK>
[   14.467268]  dump_stack_lvl+0x73/0xb0
[   14.467294]  print_report+0xd1/0x650
[   14.467315]  ? __virt_addr_valid+0x1db/0x2d0
[   14.467337]  ? kasan_atomics_helper+0x1818/0x5450
[   14.467357]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.467384]  ? kasan_atomics_helper+0x1818/0x5450
[   14.467406]  kasan_report+0x141/0x180
[   14.467428]  ? kasan_atomics_helper+0x1818/0x5450
[   14.467453]  kasan_check_range+0x10c/0x1c0
[   14.467477]  __kasan_check_write+0x18/0x20
[   14.467500]  kasan_atomics_helper+0x1818/0x5450
[   14.467521]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.467543]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.467567]  ? kasan_atomics+0x152/0x310
[   14.467593]  kasan_atomics+0x1dc/0x310
[   14.467616]  ? __pfx_kasan_atomics+0x10/0x10
[   14.467640]  ? __pfx_read_tsc+0x10/0x10
[   14.467660]  ? ktime_get_ts64+0x86/0x230
[   14.467686]  kunit_try_run_case+0x1a5/0x480
[   14.467709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.467731]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.467753]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.467776]  ? __kthread_parkme+0x82/0x180
[   14.467796]  ? preempt_count_sub+0x50/0x80
[   14.467829]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.467852]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.467875]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.467908]  kthread+0x337/0x6f0
[   14.467928]  ? trace_preempt_on+0x20/0xc0
[   14.467950]  ? __pfx_kthread+0x10/0x10
[   14.467970]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.467991]  ? calculate_sigpending+0x7b/0xa0
[   14.468014]  ? __pfx_kthread+0x10/0x10
[   14.468036]  ret_from_fork+0x116/0x1d0
[   14.468054]  ? __pfx_kthread+0x10/0x10
[   14.468075]  ret_from_fork_asm+0x1a/0x30
[   14.468105]  </TASK>
[   14.468116] 
[   14.475064] Allocated by task 291:
[   14.475249]  kasan_save_stack+0x45/0x70
[   14.475449]  kasan_save_track+0x18/0x40
[   14.475631]  kasan_save_alloc_info+0x3b/0x50
[   14.475829]  __kasan_kmalloc+0xb7/0xc0
[   14.476005]  __kmalloc_cache_noprof+0x189/0x420
[   14.476247]  kasan_atomics+0x95/0x310
[   14.476424]  kunit_try_run_case+0x1a5/0x480
[   14.476601]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.476774]  kthread+0x337/0x6f0
[   14.476887]  ret_from_fork+0x116/0x1d0
[   14.477011]  ret_from_fork_asm+0x1a/0x30
[   14.477234] 
[   14.477321] The buggy address belongs to the object at ffff8881029e2200
[   14.477321]  which belongs to the cache kmalloc-64 of size 64
[   14.477886] The buggy address is located 0 bytes to the right of
[   14.477886]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.478387] 
[   14.478476] The buggy address belongs to the physical page:
[   14.478742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.479052] flags: 0x200000000000000(node=0|zone=2)
[   14.479278] page_type: f5(slab)
[   14.479417] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.479688] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.479994] page dumped because: kasan: bad access detected
[   14.480263] 
[   14.480349] Memory state around the buggy address:
[   14.480558]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.480866]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.481183] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.481399]                                      ^
[   14.481545]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.481753]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.482061] ==================================================================
[   14.054579] ==================================================================
[   14.054893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   14.055242] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.055740] 
[   14.055839] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.055883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.055896] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.055917] Call Trace:
[   14.055930]  <TASK>
[   14.055944]  dump_stack_lvl+0x73/0xb0
[   14.055968]  print_report+0xd1/0x650
[   14.055990]  ? __virt_addr_valid+0x1db/0x2d0
[   14.056011]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.056032]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.056057]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.056079]  kasan_report+0x141/0x180
[   14.056101]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.056125]  kasan_check_range+0x10c/0x1c0
[   14.056148]  __kasan_check_write+0x18/0x20
[   14.056171]  kasan_atomics_helper+0xfa9/0x5450
[   14.056194]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.056226]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.056250]  ? kasan_atomics+0x152/0x310
[   14.056276]  kasan_atomics+0x1dc/0x310
[   14.056300]  ? __pfx_kasan_atomics+0x10/0x10
[   14.056324]  ? __pfx_read_tsc+0x10/0x10
[   14.056346]  ? ktime_get_ts64+0x86/0x230
[   14.056370]  kunit_try_run_case+0x1a5/0x480
[   14.056394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.056417]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.056439]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.056462]  ? __kthread_parkme+0x82/0x180
[   14.056482]  ? preempt_count_sub+0x50/0x80
[   14.056504]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.056528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.056551]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.056575]  kthread+0x337/0x6f0
[   14.056595]  ? trace_preempt_on+0x20/0xc0
[   14.056618]  ? __pfx_kthread+0x10/0x10
[   14.056639]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.056663]  ? calculate_sigpending+0x7b/0xa0
[   14.056687]  ? __pfx_kthread+0x10/0x10
[   14.056710]  ret_from_fork+0x116/0x1d0
[   14.056729]  ? __pfx_kthread+0x10/0x10
[   14.056749]  ret_from_fork_asm+0x1a/0x30
[   14.056779]  </TASK>
[   14.056789] 
[   14.071086] Allocated by task 291:
[   14.071553]  kasan_save_stack+0x45/0x70
[   14.072018]  kasan_save_track+0x18/0x40
[   14.072430]  kasan_save_alloc_info+0x3b/0x50
[   14.072580]  __kasan_kmalloc+0xb7/0xc0
[   14.072714]  __kmalloc_cache_noprof+0x189/0x420
[   14.072864]  kasan_atomics+0x95/0x310
[   14.072991]  kunit_try_run_case+0x1a5/0x480
[   14.073130]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.073967]  kthread+0x337/0x6f0
[   14.074555]  ret_from_fork+0x116/0x1d0
[   14.075075]  ret_from_fork_asm+0x1a/0x30
[   14.075625] 
[   14.075922] The buggy address belongs to the object at ffff8881029e2200
[   14.075922]  which belongs to the cache kmalloc-64 of size 64
[   14.077389] The buggy address is located 0 bytes to the right of
[   14.077389]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.078510] 
[   14.078814] The buggy address belongs to the physical page:
[   14.079410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.080023] flags: 0x200000000000000(node=0|zone=2)
[   14.080357] page_type: f5(slab)
[   14.080752] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.081605] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.082123] page dumped because: kasan: bad access detected
[   14.082802] 
[   14.082967] Memory state around the buggy address:
[   14.083462]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.083683]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.083896] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.084103]                                      ^
[   14.084265]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.084483]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.085039] ==================================================================
[   14.135822] ==================================================================
[   14.136313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   14.136891] Read of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.137201] 
[   14.137290] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.137334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.137346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.137367] Call Trace:
[   14.137381]  <TASK>
[   14.137394]  dump_stack_lvl+0x73/0xb0
[   14.137420]  print_report+0xd1/0x650
[   14.137441]  ? __virt_addr_valid+0x1db/0x2d0
[   14.137464]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.137486]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.137512]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.137533]  kasan_report+0x141/0x180
[   14.137556]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.137581]  __asan_report_load4_noabort+0x18/0x20
[   14.137605]  kasan_atomics_helper+0x4a1c/0x5450
[   14.137627]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.137648]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.137684]  ? kasan_atomics+0x152/0x310
[   14.137709]  kasan_atomics+0x1dc/0x310
[   14.137731]  ? __pfx_kasan_atomics+0x10/0x10
[   14.137766]  ? __pfx_read_tsc+0x10/0x10
[   14.137787]  ? ktime_get_ts64+0x86/0x230
[   14.137811]  kunit_try_run_case+0x1a5/0x480
[   14.137835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.137856]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.137878]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.137901]  ? __kthread_parkme+0x82/0x180
[   14.137921]  ? preempt_count_sub+0x50/0x80
[   14.137944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.137967]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.137989]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.138013]  kthread+0x337/0x6f0
[   14.138032]  ? trace_preempt_on+0x20/0xc0
[   14.138055]  ? __pfx_kthread+0x10/0x10
[   14.138076]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.138095]  ? calculate_sigpending+0x7b/0xa0
[   14.138120]  ? __pfx_kthread+0x10/0x10
[   14.138142]  ret_from_fork+0x116/0x1d0
[   14.138161]  ? __pfx_kthread+0x10/0x10
[   14.138181]  ret_from_fork_asm+0x1a/0x30
[   14.138219]  </TASK>
[   14.138230] 
[   14.145509] Allocated by task 291:
[   14.145627]  kasan_save_stack+0x45/0x70
[   14.145762]  kasan_save_track+0x18/0x40
[   14.145890]  kasan_save_alloc_info+0x3b/0x50
[   14.146089]  __kasan_kmalloc+0xb7/0xc0
[   14.146277]  __kmalloc_cache_noprof+0x189/0x420
[   14.146515]  kasan_atomics+0x95/0x310
[   14.146699]  kunit_try_run_case+0x1a5/0x480
[   14.146895]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.147134]  kthread+0x337/0x6f0
[   14.147445]  ret_from_fork+0x116/0x1d0
[   14.147577]  ret_from_fork_asm+0x1a/0x30
[   14.147709] 
[   14.147774] The buggy address belongs to the object at ffff8881029e2200
[   14.147774]  which belongs to the cache kmalloc-64 of size 64
[   14.148116] The buggy address is located 0 bytes to the right of
[   14.148116]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.149159] 
[   14.149262] The buggy address belongs to the physical page:
[   14.149530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.149887] flags: 0x200000000000000(node=0|zone=2)
[   14.150105] page_type: f5(slab)
[   14.150340] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.150644] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.150888] page dumped because: kasan: bad access detected
[   14.151134] 
[   14.151226] Memory state around the buggy address:
[   14.151439]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.151766]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.151973] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.152175]                                      ^
[   14.152660]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.152975]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.153380] ==================================================================
[   14.821089] ==================================================================
[   14.821654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   14.822096] Read of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.822666] 
[   14.822852] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.822909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.822921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.822943] Call Trace:
[   14.822958]  <TASK>
[   14.822972]  dump_stack_lvl+0x73/0xb0
[   14.822998]  print_report+0xd1/0x650
[   14.823020]  ? __virt_addr_valid+0x1db/0x2d0
[   14.823051]  ? kasan_atomics_helper+0x4fa5/0x5450
[   14.823073]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.823100]  ? kasan_atomics_helper+0x4fa5/0x5450
[   14.823132]  kasan_report+0x141/0x180
[   14.823154]  ? kasan_atomics_helper+0x4fa5/0x5450
[   14.823198]  __asan_report_load8_noabort+0x18/0x20
[   14.823231]  kasan_atomics_helper+0x4fa5/0x5450
[   14.823253]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.823275]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.823300]  ? kasan_atomics+0x152/0x310
[   14.823326]  kasan_atomics+0x1dc/0x310
[   14.823348]  ? __pfx_kasan_atomics+0x10/0x10
[   14.823372]  ? __pfx_read_tsc+0x10/0x10
[   14.823394]  ? ktime_get_ts64+0x86/0x230
[   14.823418]  kunit_try_run_case+0x1a5/0x480
[   14.823442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.823464]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.823486]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.823510]  ? __kthread_parkme+0x82/0x180
[   14.823530]  ? preempt_count_sub+0x50/0x80
[   14.823554]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.823578]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.823600]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.823624]  kthread+0x337/0x6f0
[   14.823643]  ? trace_preempt_on+0x20/0xc0
[   14.823667]  ? __pfx_kthread+0x10/0x10
[   14.823688]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.823708]  ? calculate_sigpending+0x7b/0xa0
[   14.823734]  ? __pfx_kthread+0x10/0x10
[   14.823758]  ret_from_fork+0x116/0x1d0
[   14.823780]  ? __pfx_kthread+0x10/0x10
[   14.823802]  ret_from_fork_asm+0x1a/0x30
[   14.823832]  </TASK>
[   14.823843] 
[   14.835360] Allocated by task 291:
[   14.835693]  kasan_save_stack+0x45/0x70
[   14.836050]  kasan_save_track+0x18/0x40
[   14.836425]  kasan_save_alloc_info+0x3b/0x50
[   14.836829]  __kasan_kmalloc+0xb7/0xc0
[   14.837211]  __kmalloc_cache_noprof+0x189/0x420
[   14.837641]  kasan_atomics+0x95/0x310
[   14.837843]  kunit_try_run_case+0x1a5/0x480
[   14.838218]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.838596]  kthread+0x337/0x6f0
[   14.838708]  ret_from_fork+0x116/0x1d0
[   14.838829]  ret_from_fork_asm+0x1a/0x30
[   14.838956] 
[   14.839017] The buggy address belongs to the object at ffff8881029e2200
[   14.839017]  which belongs to the cache kmalloc-64 of size 64
[   14.839798] The buggy address is located 0 bytes to the right of
[   14.839798]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.840879] 
[   14.841029] The buggy address belongs to the physical page:
[   14.841546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.842237] flags: 0x200000000000000(node=0|zone=2)
[   14.842667] page_type: f5(slab)
[   14.842788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.843290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.843924] page dumped because: kasan: bad access detected
[   14.844104] 
[   14.844186] Memory state around the buggy address:
[   14.844611]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.845235]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.845445] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.845645]                                      ^
[   14.845786]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.845987]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.846255] ==================================================================
[   14.446533] ==================================================================
[   14.446764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   14.446990] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.447327] 
[   14.447450] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.447497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.447509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.447546] Call Trace:
[   14.447562]  <TASK>
[   14.447576]  dump_stack_lvl+0x73/0xb0
[   14.447602]  print_report+0xd1/0x650
[   14.447624]  ? __virt_addr_valid+0x1db/0x2d0
[   14.447647]  ? kasan_atomics_helper+0x177f/0x5450
[   14.447668]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.447695]  ? kasan_atomics_helper+0x177f/0x5450
[   14.447717]  kasan_report+0x141/0x180
[   14.447739]  ? kasan_atomics_helper+0x177f/0x5450
[   14.447765]  kasan_check_range+0x10c/0x1c0
[   14.447788]  __kasan_check_write+0x18/0x20
[   14.447811]  kasan_atomics_helper+0x177f/0x5450
[   14.447833]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.447855]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.447880]  ? kasan_atomics+0x152/0x310
[   14.447905]  kasan_atomics+0x1dc/0x310
[   14.447927]  ? __pfx_kasan_atomics+0x10/0x10
[   14.447951]  ? __pfx_read_tsc+0x10/0x10
[   14.447972]  ? ktime_get_ts64+0x86/0x230
[   14.447996]  kunit_try_run_case+0x1a5/0x480
[   14.448020]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.448076]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.448099]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.448122]  ? __kthread_parkme+0x82/0x180
[   14.448153]  ? preempt_count_sub+0x50/0x80
[   14.448195]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.448261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.448284]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.448307]  kthread+0x337/0x6f0
[   14.448326]  ? trace_preempt_on+0x20/0xc0
[   14.448349]  ? __pfx_kthread+0x10/0x10
[   14.448370]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.448391]  ? calculate_sigpending+0x7b/0xa0
[   14.448414]  ? __pfx_kthread+0x10/0x10
[   14.448436]  ret_from_fork+0x116/0x1d0
[   14.448455]  ? __pfx_kthread+0x10/0x10
[   14.448476]  ret_from_fork_asm+0x1a/0x30
[   14.448505]  </TASK>
[   14.448516] 
[   14.458242] Allocated by task 291:
[   14.458416]  kasan_save_stack+0x45/0x70
[   14.458610]  kasan_save_track+0x18/0x40
[   14.458804]  kasan_save_alloc_info+0x3b/0x50
[   14.459010]  __kasan_kmalloc+0xb7/0xc0
[   14.459242]  __kmalloc_cache_noprof+0x189/0x420
[   14.459454]  kasan_atomics+0x95/0x310
[   14.459629]  kunit_try_run_case+0x1a5/0x480
[   14.459769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.459940]  kthread+0x337/0x6f0
[   14.460057]  ret_from_fork+0x116/0x1d0
[   14.460306]  ret_from_fork_asm+0x1a/0x30
[   14.460498] 
[   14.460591] The buggy address belongs to the object at ffff8881029e2200
[   14.460591]  which belongs to the cache kmalloc-64 of size 64
[   14.461107] The buggy address is located 0 bytes to the right of
[   14.461107]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.461688] 
[   14.461758] The buggy address belongs to the physical page:
[   14.461924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.462159] flags: 0x200000000000000(node=0|zone=2)
[   14.462416] page_type: f5(slab)
[   14.462598] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.462952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.463336] page dumped because: kasan: bad access detected
[   14.463570] 
[   14.463649] Memory state around the buggy address:
[   14.463830]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.464139]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.464433] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.464718]                                      ^
[   14.464936]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.465260]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.465548] ==================================================================
[   13.870378] ==================================================================
[   13.870828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   13.871179] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   13.871422] 
[   13.871506] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.871551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.871564] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.871585] Call Trace:
[   13.871601]  <TASK>
[   13.871616]  dump_stack_lvl+0x73/0xb0
[   13.871642]  print_report+0xd1/0x650
[   13.871663]  ? __virt_addr_valid+0x1db/0x2d0
[   13.871685]  ? kasan_atomics_helper+0x992/0x5450
[   13.871706]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.871731]  ? kasan_atomics_helper+0x992/0x5450
[   13.871753]  kasan_report+0x141/0x180
[   13.871774]  ? kasan_atomics_helper+0x992/0x5450
[   13.871800]  kasan_check_range+0x10c/0x1c0
[   13.871824]  __kasan_check_write+0x18/0x20
[   13.871847]  kasan_atomics_helper+0x992/0x5450
[   13.871869]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.871890]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.871914]  ? kasan_atomics+0x152/0x310
[   13.871940]  kasan_atomics+0x1dc/0x310
[   13.871962]  ? __pfx_kasan_atomics+0x10/0x10
[   13.871986]  ? __pfx_read_tsc+0x10/0x10
[   13.872008]  ? ktime_get_ts64+0x86/0x230
[   13.872032]  kunit_try_run_case+0x1a5/0x480
[   13.872056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.872079]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.872101]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.872124]  ? __kthread_parkme+0x82/0x180
[   13.872147]  ? preempt_count_sub+0x50/0x80
[   13.872171]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.872195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.872228]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.872251]  kthread+0x337/0x6f0
[   13.872271]  ? trace_preempt_on+0x20/0xc0
[   13.872294]  ? __pfx_kthread+0x10/0x10
[   13.872314]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.872335]  ? calculate_sigpending+0x7b/0xa0
[   13.872358]  ? __pfx_kthread+0x10/0x10
[   13.872380]  ret_from_fork+0x116/0x1d0
[   13.872398]  ? __pfx_kthread+0x10/0x10
[   13.872418]  ret_from_fork_asm+0x1a/0x30
[   13.872448]  </TASK>
[   13.872459] 
[   13.879983] Allocated by task 291:
[   13.880146]  kasan_save_stack+0x45/0x70
[   13.880293]  kasan_save_track+0x18/0x40
[   13.880422]  kasan_save_alloc_info+0x3b/0x50
[   13.880562]  __kasan_kmalloc+0xb7/0xc0
[   13.880750]  __kmalloc_cache_noprof+0x189/0x420
[   13.880987]  kasan_atomics+0x95/0x310
[   13.881170]  kunit_try_run_case+0x1a5/0x480
[   13.881389]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.881631]  kthread+0x337/0x6f0
[   13.881774]  ret_from_fork+0x116/0x1d0
[   13.881951]  ret_from_fork_asm+0x1a/0x30
[   13.882125] 
[   13.882232] The buggy address belongs to the object at ffff8881029e2200
[   13.882232]  which belongs to the cache kmalloc-64 of size 64
[   13.882691] The buggy address is located 0 bytes to the right of
[   13.882691]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   13.883048] 
[   13.883112] The buggy address belongs to the physical page:
[   13.883551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   13.883912] flags: 0x200000000000000(node=0|zone=2)
[   13.884134] page_type: f5(slab)
[   13.884275] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.884499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.884722] page dumped because: kasan: bad access detected
[   13.885071] 
[   13.885160] Memory state around the buggy address:
[   13.885404]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.885718]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.886025] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.886377]                                      ^
[   13.886611]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.886866]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.887074] ==================================================================
[   13.835096] ==================================================================
[   13.835545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   13.835964] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   13.836338] 
[   13.836476] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.836524] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.836538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.836560] Call Trace:
[   13.836575]  <TASK>
[   13.836592]  dump_stack_lvl+0x73/0xb0
[   13.836619]  print_report+0xd1/0x650
[   13.836641]  ? __virt_addr_valid+0x1db/0x2d0
[   13.836669]  ? kasan_atomics_helper+0x860/0x5450
[   13.836690]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.836716]  ? kasan_atomics_helper+0x860/0x5450
[   13.836736]  kasan_report+0x141/0x180
[   13.836758]  ? kasan_atomics_helper+0x860/0x5450
[   13.836783]  kasan_check_range+0x10c/0x1c0
[   13.836806]  __kasan_check_write+0x18/0x20
[   13.836829]  kasan_atomics_helper+0x860/0x5450
[   13.836850]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.836872]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.836897]  ? kasan_atomics+0x152/0x310
[   13.836922]  kasan_atomics+0x1dc/0x310
[   13.836945]  ? __pfx_kasan_atomics+0x10/0x10
[   13.836968]  ? __pfx_read_tsc+0x10/0x10
[   13.836989]  ? ktime_get_ts64+0x86/0x230
[   13.837014]  kunit_try_run_case+0x1a5/0x480
[   13.837037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.837059]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.837081]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.837104]  ? __kthread_parkme+0x82/0x180
[   13.837124]  ? preempt_count_sub+0x50/0x80
[   13.837147]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.837171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.837192]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.837247]  kthread+0x337/0x6f0
[   13.837268]  ? trace_preempt_on+0x20/0xc0
[   13.837291]  ? __pfx_kthread+0x10/0x10
[   13.837312]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.837331]  ? calculate_sigpending+0x7b/0xa0
[   13.837355]  ? __pfx_kthread+0x10/0x10
[   13.837377]  ret_from_fork+0x116/0x1d0
[   13.837395]  ? __pfx_kthread+0x10/0x10
[   13.837415]  ret_from_fork_asm+0x1a/0x30
[   13.837447]  </TASK>
[   13.837457] 
[   13.844869] Allocated by task 291:
[   13.845047]  kasan_save_stack+0x45/0x70
[   13.845248]  kasan_save_track+0x18/0x40
[   13.845494]  kasan_save_alloc_info+0x3b/0x50
[   13.845669]  __kasan_kmalloc+0xb7/0xc0
[   13.845795]  __kmalloc_cache_noprof+0x189/0x420
[   13.845945]  kasan_atomics+0x95/0x310
[   13.846100]  kunit_try_run_case+0x1a5/0x480
[   13.846306]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.846553]  kthread+0x337/0x6f0
[   13.846716]  ret_from_fork+0x116/0x1d0
[   13.846964]  ret_from_fork_asm+0x1a/0x30
[   13.847151] 
[   13.847225] The buggy address belongs to the object at ffff8881029e2200
[   13.847225]  which belongs to the cache kmalloc-64 of size 64
[   13.847570] The buggy address is located 0 bytes to the right of
[   13.847570]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   13.848460] 
[   13.848552] The buggy address belongs to the physical page:
[   13.848784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   13.849019] flags: 0x200000000000000(node=0|zone=2)
[   13.849179] page_type: f5(slab)
[   13.849364] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.849718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.850069] page dumped because: kasan: bad access detected
[   13.850368] 
[   13.850474] Memory state around the buggy address:
[   13.850669]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.850912]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.851184] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.851400]                                      ^
[   13.851548]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.851756]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.852253] ==================================================================
[   14.719879] ==================================================================
[   14.720541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   14.721321] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.721942] 
[   14.722123] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.722169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.722181] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.722213] Call Trace:
[   14.722228]  <TASK>
[   14.722242]  dump_stack_lvl+0x73/0xb0
[   14.722277]  print_report+0xd1/0x650
[   14.722300]  ? __virt_addr_valid+0x1db/0x2d0
[   14.722322]  ? kasan_atomics_helper+0x2006/0x5450
[   14.722354]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.722380]  ? kasan_atomics_helper+0x2006/0x5450
[   14.722402]  kasan_report+0x141/0x180
[   14.722423]  ? kasan_atomics_helper+0x2006/0x5450
[   14.722449]  kasan_check_range+0x10c/0x1c0
[   14.722473]  __kasan_check_write+0x18/0x20
[   14.722496]  kasan_atomics_helper+0x2006/0x5450
[   14.722518]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.722540]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.722564]  ? kasan_atomics+0x152/0x310
[   14.722590]  kasan_atomics+0x1dc/0x310
[   14.722612]  ? __pfx_kasan_atomics+0x10/0x10
[   14.722636]  ? __pfx_read_tsc+0x10/0x10
[   14.722657]  ? ktime_get_ts64+0x86/0x230
[   14.722681]  kunit_try_run_case+0x1a5/0x480
[   14.722705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.722727]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.722750]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.722771]  ? __kthread_parkme+0x82/0x180
[   14.722791]  ? preempt_count_sub+0x50/0x80
[   14.722814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.722837]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.722860]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.722883]  kthread+0x337/0x6f0
[   14.722902]  ? trace_preempt_on+0x20/0xc0
[   14.722924]  ? __pfx_kthread+0x10/0x10
[   14.722945]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.722965]  ? calculate_sigpending+0x7b/0xa0
[   14.722988]  ? __pfx_kthread+0x10/0x10
[   14.723010]  ret_from_fork+0x116/0x1d0
[   14.723028]  ? __pfx_kthread+0x10/0x10
[   14.723049]  ret_from_fork_asm+0x1a/0x30
[   14.723078]  </TASK>
[   14.723089] 
[   14.734448] Allocated by task 291:
[   14.734775]  kasan_save_stack+0x45/0x70
[   14.735148]  kasan_save_track+0x18/0x40
[   14.735520]  kasan_save_alloc_info+0x3b/0x50
[   14.735758]  __kasan_kmalloc+0xb7/0xc0
[   14.735887]  __kmalloc_cache_noprof+0x189/0x420
[   14.736037]  kasan_atomics+0x95/0x310
[   14.736165]  kunit_try_run_case+0x1a5/0x480
[   14.736345]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.736566]  kthread+0x337/0x6f0
[   14.736687]  ret_from_fork+0x116/0x1d0
[   14.736826]  ret_from_fork_asm+0x1a/0x30
[   14.737016] 
[   14.737104] The buggy address belongs to the object at ffff8881029e2200
[   14.737104]  which belongs to the cache kmalloc-64 of size 64
[   14.737649] The buggy address is located 0 bytes to the right of
[   14.737649]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.738119] 
[   14.738251] The buggy address belongs to the physical page:
[   14.738514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.738799] flags: 0x200000000000000(node=0|zone=2)
[   14.739055] page_type: f5(slab)
[   14.739249] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.739502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.739818] page dumped because: kasan: bad access detected
[   14.740091] 
[   14.740193] Memory state around the buggy address:
[   14.740351]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.740661]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.740956] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.741245]                                      ^
[   14.741484]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.741741]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.742035] ==================================================================
[   13.644010] ==================================================================
[   13.644383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   13.644723] Read of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   13.645033] 
[   13.645132] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.645197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.645217] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.645241] Call Trace:
[   13.645253]  <TASK>
[   13.645267]  dump_stack_lvl+0x73/0xb0
[   13.645293]  print_report+0xd1/0x650
[   13.645315]  ? __virt_addr_valid+0x1db/0x2d0
[   13.645337]  ? kasan_atomics_helper+0x3df/0x5450
[   13.645359]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.645384]  ? kasan_atomics_helper+0x3df/0x5450
[   13.645406]  kasan_report+0x141/0x180
[   13.645428]  ? kasan_atomics_helper+0x3df/0x5450
[   13.645453]  kasan_check_range+0x10c/0x1c0
[   13.645478]  __kasan_check_read+0x15/0x20
[   13.645501]  kasan_atomics_helper+0x3df/0x5450
[   13.645523]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.645546]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.645572]  ? kasan_atomics+0x152/0x310
[   13.645599]  kasan_atomics+0x1dc/0x310
[   13.645622]  ? __pfx_kasan_atomics+0x10/0x10
[   13.645646]  ? __pfx_read_tsc+0x10/0x10
[   13.645668]  ? ktime_get_ts64+0x86/0x230
[   13.645693]  kunit_try_run_case+0x1a5/0x480
[   13.645717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.645739]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.645761]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.645785]  ? __kthread_parkme+0x82/0x180
[   13.645806]  ? preempt_count_sub+0x50/0x80
[   13.645830]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.645853]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.645876]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.645900]  kthread+0x337/0x6f0
[   13.645919]  ? trace_preempt_on+0x20/0xc0
[   13.645943]  ? __pfx_kthread+0x10/0x10
[   13.645964]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.645984]  ? calculate_sigpending+0x7b/0xa0
[   13.646009]  ? __pfx_kthread+0x10/0x10
[   13.646030]  ret_from_fork+0x116/0x1d0
[   13.646048]  ? __pfx_kthread+0x10/0x10
[   13.646069]  ret_from_fork_asm+0x1a/0x30
[   13.646100]  </TASK>
[   13.646111] 
[   13.652812] Allocated by task 291:
[   13.652935]  kasan_save_stack+0x45/0x70
[   13.653124]  kasan_save_track+0x18/0x40
[   13.653363]  kasan_save_alloc_info+0x3b/0x50
[   13.653590]  __kasan_kmalloc+0xb7/0xc0
[   13.653808]  __kmalloc_cache_noprof+0x189/0x420
[   13.654047]  kasan_atomics+0x95/0x310
[   13.654258]  kunit_try_run_case+0x1a5/0x480
[   13.654457]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.654635]  kthread+0x337/0x6f0
[   13.654792]  ret_from_fork+0x116/0x1d0
[   13.654989]  ret_from_fork_asm+0x1a/0x30
[   13.655243] 
[   13.655328] The buggy address belongs to the object at ffff8881029e2200
[   13.655328]  which belongs to the cache kmalloc-64 of size 64
[   13.655746] The buggy address is located 0 bytes to the right of
[   13.655746]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   13.656289] 
[   13.656377] The buggy address belongs to the physical page:
[   13.656634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   13.656981] flags: 0x200000000000000(node=0|zone=2)
[   13.657230] page_type: f5(slab)
[   13.657361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.657664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.657999] page dumped because: kasan: bad access detected
[   13.658259] 
[   13.658322] Memory state around the buggy address:
[   13.658523]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.658778]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.659105] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.659401]                                      ^
[   13.659618]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.659898]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.660224] ==================================================================
[   14.777381] ==================================================================
[   14.777727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   14.778089] Read of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.778455] 
[   14.778574] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.778631] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.778644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.778666] Call Trace:
[   14.778682]  <TASK>
[   14.778698]  dump_stack_lvl+0x73/0xb0
[   14.778726]  print_report+0xd1/0x650
[   14.778750]  ? __virt_addr_valid+0x1db/0x2d0
[   14.778774]  ? kasan_atomics_helper+0x4fb2/0x5450
[   14.778797]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.778823]  ? kasan_atomics_helper+0x4fb2/0x5450
[   14.778845]  kasan_report+0x141/0x180
[   14.778869]  ? kasan_atomics_helper+0x4fb2/0x5450
[   14.778895]  __asan_report_load8_noabort+0x18/0x20
[   14.778919]  kasan_atomics_helper+0x4fb2/0x5450
[   14.778942]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.778964]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.778990]  ? kasan_atomics+0x152/0x310
[   14.779016]  kasan_atomics+0x1dc/0x310
[   14.779038]  ? __pfx_kasan_atomics+0x10/0x10
[   14.779062]  ? __pfx_read_tsc+0x10/0x10
[   14.779083]  ? ktime_get_ts64+0x86/0x230
[   14.779107]  kunit_try_run_case+0x1a5/0x480
[   14.779131]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.779153]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.779196]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.779227]  ? __kthread_parkme+0x82/0x180
[   14.779256]  ? preempt_count_sub+0x50/0x80
[   14.779280]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.779303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.779336]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.779359]  kthread+0x337/0x6f0
[   14.779379]  ? trace_preempt_on+0x20/0xc0
[   14.779403]  ? __pfx_kthread+0x10/0x10
[   14.779423]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.779444]  ? calculate_sigpending+0x7b/0xa0
[   14.779468]  ? __pfx_kthread+0x10/0x10
[   14.779490]  ret_from_fork+0x116/0x1d0
[   14.779508]  ? __pfx_kthread+0x10/0x10
[   14.779528]  ret_from_fork_asm+0x1a/0x30
[   14.779558]  </TASK>
[   14.779568] 
[   14.786621] Allocated by task 291:
[   14.786794]  kasan_save_stack+0x45/0x70
[   14.786978]  kasan_save_track+0x18/0x40
[   14.787147]  kasan_save_alloc_info+0x3b/0x50
[   14.787315]  __kasan_kmalloc+0xb7/0xc0
[   14.787442]  __kmalloc_cache_noprof+0x189/0x420
[   14.787590]  kasan_atomics+0x95/0x310
[   14.787786]  kunit_try_run_case+0x1a5/0x480
[   14.787986]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.788253]  kthread+0x337/0x6f0
[   14.788414]  ret_from_fork+0x116/0x1d0
[   14.788565]  ret_from_fork_asm+0x1a/0x30
[   14.788700] 
[   14.788764] The buggy address belongs to the object at ffff8881029e2200
[   14.788764]  which belongs to the cache kmalloc-64 of size 64
[   14.789226] The buggy address is located 0 bytes to the right of
[   14.789226]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.789812] 
[   14.789901] The buggy address belongs to the physical page:
[   14.790189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.790528] flags: 0x200000000000000(node=0|zone=2)
[   14.790772] page_type: f5(slab)
[   14.790897] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.791122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.791374] page dumped because: kasan: bad access detected
[   14.791566] 
[   14.791650] Memory state around the buggy address:
[   14.791862]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.792253]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.792602] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.792814]                                      ^
[   14.792960]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.793187]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.793504] ==================================================================
[   13.558928] ==================================================================
[   13.559585] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   13.560248] Read of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   13.560603] 
[   13.560697] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.560745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.560757] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.560779] Call Trace:
[   13.560790]  <TASK>
[   13.560806]  dump_stack_lvl+0x73/0xb0
[   13.560834]  print_report+0xd1/0x650
[   13.560856]  ? __virt_addr_valid+0x1db/0x2d0
[   13.560879]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.560899]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.560924]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.560944]  kasan_report+0x141/0x180
[   13.560965]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.560989]  __asan_report_load4_noabort+0x18/0x20
[   13.561012]  kasan_atomics_helper+0x4bbc/0x5450
[   13.561034]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.561054]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.561079]  ? kasan_atomics+0x152/0x310
[   13.561104]  kasan_atomics+0x1dc/0x310
[   13.561125]  ? __pfx_kasan_atomics+0x10/0x10
[   13.561148]  ? __pfx_read_tsc+0x10/0x10
[   13.561170]  ? ktime_get_ts64+0x86/0x230
[   13.561194]  kunit_try_run_case+0x1a5/0x480
[   13.561228]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.561249]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.561271]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.561293]  ? __kthread_parkme+0x82/0x180
[   13.561314]  ? preempt_count_sub+0x50/0x80
[   13.561337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.561362]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.561384]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.561407]  kthread+0x337/0x6f0
[   13.561426]  ? trace_preempt_on+0x20/0xc0
[   13.561449]  ? __pfx_kthread+0x10/0x10
[   13.561468]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.561488]  ? calculate_sigpending+0x7b/0xa0
[   13.561511]  ? __pfx_kthread+0x10/0x10
[   13.561532]  ret_from_fork+0x116/0x1d0
[   13.561550]  ? __pfx_kthread+0x10/0x10
[   13.561570]  ret_from_fork_asm+0x1a/0x30
[   13.561599]  </TASK>
[   13.561609] 
[   13.571895] Allocated by task 291:
[   13.572120]  kasan_save_stack+0x45/0x70
[   13.572282]  kasan_save_track+0x18/0x40
[   13.572514]  kasan_save_alloc_info+0x3b/0x50
[   13.572693]  __kasan_kmalloc+0xb7/0xc0
[   13.572853]  __kmalloc_cache_noprof+0x189/0x420
[   13.573041]  kasan_atomics+0x95/0x310
[   13.573610]  kunit_try_run_case+0x1a5/0x480
[   13.573801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.574029]  kthread+0x337/0x6f0
[   13.574404]  ret_from_fork+0x116/0x1d0
[   13.574692]  ret_from_fork_asm+0x1a/0x30
[   13.574834] 
[   13.574925] The buggy address belongs to the object at ffff8881029e2200
[   13.574925]  which belongs to the cache kmalloc-64 of size 64
[   13.575758] The buggy address is located 0 bytes to the right of
[   13.575758]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   13.576433] 
[   13.576583] The buggy address belongs to the physical page:
[   13.576846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   13.577175] flags: 0x200000000000000(node=0|zone=2)
[   13.577693] page_type: f5(slab)
[   13.577980] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.578316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.578788] page dumped because: kasan: bad access detected
[   13.579134] 
[   13.579265] Memory state around the buggy address:
[   13.579616]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.579938]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.580533] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.580899]                                      ^
[   13.581080]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.581612]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.581864] ==================================================================
[   14.550759] ==================================================================
[   14.551090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   14.551600] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.551927] 
[   14.552049] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.552093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.552106] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.552128] Call Trace:
[   14.552142]  <TASK>
[   14.552156]  dump_stack_lvl+0x73/0xb0
[   14.552215]  print_report+0xd1/0x650
[   14.552236]  ? __virt_addr_valid+0x1db/0x2d0
[   14.552259]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.552280]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.552306]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.552327]  kasan_report+0x141/0x180
[   14.552349]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.552384]  kasan_check_range+0x10c/0x1c0
[   14.552407]  __kasan_check_write+0x18/0x20
[   14.552430]  kasan_atomics_helper+0x1b22/0x5450
[   14.552462]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.552484]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.552508]  ? kasan_atomics+0x152/0x310
[   14.552542]  kasan_atomics+0x1dc/0x310
[   14.552564]  ? __pfx_kasan_atomics+0x10/0x10
[   14.552587]  ? __pfx_read_tsc+0x10/0x10
[   14.552618]  ? ktime_get_ts64+0x86/0x230
[   14.552643]  kunit_try_run_case+0x1a5/0x480
[   14.552670]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.552692]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.552723]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.552745]  ? __kthread_parkme+0x82/0x180
[   14.552765]  ? preempt_count_sub+0x50/0x80
[   14.552798]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.552821]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.552843]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.552875]  kthread+0x337/0x6f0
[   14.552896]  ? trace_preempt_on+0x20/0xc0
[   14.552918]  ? __pfx_kthread+0x10/0x10
[   14.552949]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.552970]  ? calculate_sigpending+0x7b/0xa0
[   14.552993]  ? __pfx_kthread+0x10/0x10
[   14.553023]  ret_from_fork+0x116/0x1d0
[   14.553041]  ? __pfx_kthread+0x10/0x10
[   14.553062]  ret_from_fork_asm+0x1a/0x30
[   14.553101]  </TASK>
[   14.553112] 
[   14.560216] Allocated by task 291:
[   14.560383]  kasan_save_stack+0x45/0x70
[   14.560594]  kasan_save_track+0x18/0x40
[   14.560779]  kasan_save_alloc_info+0x3b/0x50
[   14.560976]  __kasan_kmalloc+0xb7/0xc0
[   14.561151]  __kmalloc_cache_noprof+0x189/0x420
[   14.561383]  kasan_atomics+0x95/0x310
[   14.561560]  kunit_try_run_case+0x1a5/0x480
[   14.561753]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.561991]  kthread+0x337/0x6f0
[   14.562148]  ret_from_fork+0x116/0x1d0
[   14.562358]  ret_from_fork_asm+0x1a/0x30
[   14.562548] 
[   14.562623] The buggy address belongs to the object at ffff8881029e2200
[   14.562623]  which belongs to the cache kmalloc-64 of size 64
[   14.562964] The buggy address is located 0 bytes to the right of
[   14.562964]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.563437] 
[   14.563524] The buggy address belongs to the physical page:
[   14.563791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.564153] flags: 0x200000000000000(node=0|zone=2)
[   14.564400] page_type: f5(slab)
[   14.564581] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.564938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.565304] page dumped because: kasan: bad access detected
[   14.565526] 
[   14.565610] Memory state around the buggy address:
[   14.565819]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.566122]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.566472] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.566766]                                      ^
[   14.566951]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.567264]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.567565] ==================================================================
[   14.311836] ==================================================================
[   14.312076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   14.312689] Read of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.313330] 
[   14.313518] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.313566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.313578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.313601] Call Trace:
[   14.313615]  <TASK>
[   14.313630]  dump_stack_lvl+0x73/0xb0
[   14.313656]  print_report+0xd1/0x650
[   14.313677]  ? __virt_addr_valid+0x1db/0x2d0
[   14.313699]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.313720]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.313757]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.313780]  kasan_report+0x141/0x180
[   14.313801]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.313837]  __asan_report_load8_noabort+0x18/0x20
[   14.313861]  kasan_atomics_helper+0x4eae/0x5450
[   14.313883]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.313905]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.313938]  ? kasan_atomics+0x152/0x310
[   14.313963]  kasan_atomics+0x1dc/0x310
[   14.313995]  ? __pfx_kasan_atomics+0x10/0x10
[   14.314020]  ? __pfx_read_tsc+0x10/0x10
[   14.314042]  ? ktime_get_ts64+0x86/0x230
[   14.314068]  kunit_try_run_case+0x1a5/0x480
[   14.314091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.314113]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.314134]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.314157]  ? __kthread_parkme+0x82/0x180
[   14.314197]  ? preempt_count_sub+0x50/0x80
[   14.314230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.314254]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.314278]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.314302]  kthread+0x337/0x6f0
[   14.314322]  ? trace_preempt_on+0x20/0xc0
[   14.314345]  ? __pfx_kthread+0x10/0x10
[   14.314366]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.314388]  ? calculate_sigpending+0x7b/0xa0
[   14.314413]  ? __pfx_kthread+0x10/0x10
[   14.314435]  ret_from_fork+0x116/0x1d0
[   14.314454]  ? __pfx_kthread+0x10/0x10
[   14.314474]  ret_from_fork_asm+0x1a/0x30
[   14.314505]  </TASK>
[   14.314516] 
[   14.326123] Allocated by task 291:
[   14.326464]  kasan_save_stack+0x45/0x70
[   14.326822]  kasan_save_track+0x18/0x40
[   14.327189]  kasan_save_alloc_info+0x3b/0x50
[   14.327581]  __kasan_kmalloc+0xb7/0xc0
[   14.327930]  __kmalloc_cache_noprof+0x189/0x420
[   14.328362]  kasan_atomics+0x95/0x310
[   14.328708]  kunit_try_run_case+0x1a5/0x480
[   14.329090]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.329578]  kthread+0x337/0x6f0
[   14.329694]  ret_from_fork+0x116/0x1d0
[   14.329819]  ret_from_fork_asm+0x1a/0x30
[   14.329953] 
[   14.330017] The buggy address belongs to the object at ffff8881029e2200
[   14.330017]  which belongs to the cache kmalloc-64 of size 64
[   14.330825] The buggy address is located 0 bytes to the right of
[   14.330825]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.331920] 
[   14.332076] The buggy address belongs to the physical page:
[   14.332582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.333283] flags: 0x200000000000000(node=0|zone=2)
[   14.333524] page_type: f5(slab)
[   14.333851] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.334285] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.334856] page dumped because: kasan: bad access detected
[   14.335020] 
[   14.335083] Memory state around the buggy address:
[   14.335408]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.336028]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.336653] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.337117]                                      ^
[   14.337521]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.337990]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.338302] ==================================================================
[   13.887751] ==================================================================
[   13.888083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   13.888482] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   13.888811] 
[   13.888892] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.888939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.888951] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.888973] Call Trace:
[   13.888987]  <TASK>
[   13.889001]  dump_stack_lvl+0x73/0xb0
[   13.889027]  print_report+0xd1/0x650
[   13.889049]  ? __virt_addr_valid+0x1db/0x2d0
[   13.889071]  ? kasan_atomics_helper+0xa2b/0x5450
[   13.889092]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.889118]  ? kasan_atomics_helper+0xa2b/0x5450
[   13.889139]  kasan_report+0x141/0x180
[   13.889161]  ? kasan_atomics_helper+0xa2b/0x5450
[   13.889186]  kasan_check_range+0x10c/0x1c0
[   13.889220]  __kasan_check_write+0x18/0x20
[   13.889243]  kasan_atomics_helper+0xa2b/0x5450
[   13.889265]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.889287]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.889311]  ? kasan_atomics+0x152/0x310
[   13.889337]  kasan_atomics+0x1dc/0x310
[   13.889358]  ? __pfx_kasan_atomics+0x10/0x10
[   13.889382]  ? __pfx_read_tsc+0x10/0x10
[   13.889426]  ? ktime_get_ts64+0x86/0x230
[   13.889451]  kunit_try_run_case+0x1a5/0x480
[   13.889474]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.889496]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.889519]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.889542]  ? __kthread_parkme+0x82/0x180
[   13.889562]  ? preempt_count_sub+0x50/0x80
[   13.889586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.889609]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.889632]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.889655]  kthread+0x337/0x6f0
[   13.889675]  ? trace_preempt_on+0x20/0xc0
[   13.889697]  ? __pfx_kthread+0x10/0x10
[   13.889718]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.889738]  ? calculate_sigpending+0x7b/0xa0
[   13.889762]  ? __pfx_kthread+0x10/0x10
[   13.889783]  ret_from_fork+0x116/0x1d0
[   13.889802]  ? __pfx_kthread+0x10/0x10
[   13.889823]  ret_from_fork_asm+0x1a/0x30
[   13.889853]  </TASK>
[   13.889882] 
[   13.897152] Allocated by task 291:
[   13.897299]  kasan_save_stack+0x45/0x70
[   13.897448]  kasan_save_track+0x18/0x40
[   13.897578]  kasan_save_alloc_info+0x3b/0x50
[   13.897801]  __kasan_kmalloc+0xb7/0xc0
[   13.897983]  __kmalloc_cache_noprof+0x189/0x420
[   13.898189]  kasan_atomics+0x95/0x310
[   13.898375]  kunit_try_run_case+0x1a5/0x480
[   13.898561]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.898730]  kthread+0x337/0x6f0
[   13.898910]  ret_from_fork+0x116/0x1d0
[   13.899089]  ret_from_fork_asm+0x1a/0x30
[   13.899409] 
[   13.899481] The buggy address belongs to the object at ffff8881029e2200
[   13.899481]  which belongs to the cache kmalloc-64 of size 64
[   13.899825] The buggy address is located 0 bytes to the right of
[   13.899825]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   13.900381] 
[   13.900470] The buggy address belongs to the physical page:
[   13.900718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   13.901054] flags: 0x200000000000000(node=0|zone=2)
[   13.901400] page_type: f5(slab)
[   13.901546] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.901799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.902039] page dumped because: kasan: bad access detected
[   13.902280] 
[   13.902383] Memory state around the buggy address:
[   13.902694]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.902959]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.903159] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.903450]                                      ^
[   13.903660]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.903989]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.904297] ==================================================================
[   13.704302] ==================================================================
[   13.704643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   13.704906] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   13.705277] 
[   13.705386] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.705431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.705444] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.705465] Call Trace:
[   13.705480]  <TASK>
[   13.705495]  dump_stack_lvl+0x73/0xb0
[   13.705521]  print_report+0xd1/0x650
[   13.705543]  ? __virt_addr_valid+0x1db/0x2d0
[   13.705564]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.705585]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.705611]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.705633]  kasan_report+0x141/0x180
[   13.705654]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.705680]  __asan_report_store4_noabort+0x1b/0x30
[   13.705704]  kasan_atomics_helper+0x4b3a/0x5450
[   13.705726]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.705748]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.705772]  ? kasan_atomics+0x152/0x310
[   13.705797]  kasan_atomics+0x1dc/0x310
[   13.705820]  ? __pfx_kasan_atomics+0x10/0x10
[   13.705843]  ? __pfx_read_tsc+0x10/0x10
[   13.705864]  ? ktime_get_ts64+0x86/0x230
[   13.705888]  kunit_try_run_case+0x1a5/0x480
[   13.705913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.705934]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.705956]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.705979]  ? __kthread_parkme+0x82/0x180
[   13.706000]  ? preempt_count_sub+0x50/0x80
[   13.706023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.706046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.706069]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.706092]  kthread+0x337/0x6f0
[   13.706112]  ? trace_preempt_on+0x20/0xc0
[   13.706135]  ? __pfx_kthread+0x10/0x10
[   13.706156]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.706229]  ? calculate_sigpending+0x7b/0xa0
[   13.706254]  ? __pfx_kthread+0x10/0x10
[   13.706276]  ret_from_fork+0x116/0x1d0
[   13.706295]  ? __pfx_kthread+0x10/0x10
[   13.706316]  ret_from_fork_asm+0x1a/0x30
[   13.706346]  </TASK>
[   13.706357] 
[   13.713183] Allocated by task 291:
[   13.713363]  kasan_save_stack+0x45/0x70
[   13.713559]  kasan_save_track+0x18/0x40
[   13.713744]  kasan_save_alloc_info+0x3b/0x50
[   13.713936]  __kasan_kmalloc+0xb7/0xc0
[   13.714114]  __kmalloc_cache_noprof+0x189/0x420
[   13.714345]  kasan_atomics+0x95/0x310
[   13.714473]  kunit_try_run_case+0x1a5/0x480
[   13.714673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.714914]  kthread+0x337/0x6f0
[   13.715073]  ret_from_fork+0x116/0x1d0
[   13.715259]  ret_from_fork_asm+0x1a/0x30
[   13.715437] 
[   13.715511] The buggy address belongs to the object at ffff8881029e2200
[   13.715511]  which belongs to the cache kmalloc-64 of size 64
[   13.715898] The buggy address is located 0 bytes to the right of
[   13.715898]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   13.716290] 
[   13.716402] The buggy address belongs to the physical page:
[   13.716646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   13.717011] flags: 0x200000000000000(node=0|zone=2)
[   13.717272] page_type: f5(slab)
[   13.717449] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.717777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.718081] page dumped because: kasan: bad access detected
[   13.718330] 
[   13.718396] Memory state around the buggy address:
[   13.718543]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.718753]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.718961] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.719250]                                      ^
[   13.719486]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.719802]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.720111] ==================================================================
[   13.788253] ==================================================================
[   13.788669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   13.789014] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   13.789373] 
[   13.789455] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.789500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.789512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.789534] Call Trace:
[   13.789547]  <TASK>
[   13.789562]  dump_stack_lvl+0x73/0xb0
[   13.789588]  print_report+0xd1/0x650
[   13.789609]  ? __virt_addr_valid+0x1db/0x2d0
[   13.789631]  ? kasan_atomics_helper+0x72f/0x5450
[   13.789652]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.789677]  ? kasan_atomics_helper+0x72f/0x5450
[   13.789699]  kasan_report+0x141/0x180
[   13.789720]  ? kasan_atomics_helper+0x72f/0x5450
[   13.789745]  kasan_check_range+0x10c/0x1c0
[   13.789768]  __kasan_check_write+0x18/0x20
[   13.789791]  kasan_atomics_helper+0x72f/0x5450
[   13.789813]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.789835]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.789860]  ? kasan_atomics+0x152/0x310
[   13.789885]  kasan_atomics+0x1dc/0x310
[   13.789907]  ? __pfx_kasan_atomics+0x10/0x10
[   13.789931]  ? __pfx_read_tsc+0x10/0x10
[   13.789951]  ? ktime_get_ts64+0x86/0x230
[   13.789975]  kunit_try_run_case+0x1a5/0x480
[   13.789999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.790021]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.790042]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.790064]  ? __kthread_parkme+0x82/0x180
[   13.790085]  ? preempt_count_sub+0x50/0x80
[   13.790107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.790130]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.790152]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.790184]  kthread+0x337/0x6f0
[   13.790211]  ? trace_preempt_on+0x20/0xc0
[   13.790233]  ? __pfx_kthread+0x10/0x10
[   13.790254]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.790276]  ? calculate_sigpending+0x7b/0xa0
[   13.790300]  ? __pfx_kthread+0x10/0x10
[   13.790321]  ret_from_fork+0x116/0x1d0
[   13.790340]  ? __pfx_kthread+0x10/0x10
[   13.790361]  ret_from_fork_asm+0x1a/0x30
[   13.790390]  </TASK>
[   13.790401] 
[   13.799237] Allocated by task 291:
[   13.799560]  kasan_save_stack+0x45/0x70
[   13.799835]  kasan_save_track+0x18/0x40
[   13.800035]  kasan_save_alloc_info+0x3b/0x50
[   13.800411]  __kasan_kmalloc+0xb7/0xc0
[   13.800671]  __kmalloc_cache_noprof+0x189/0x420
[   13.800977]  kasan_atomics+0x95/0x310
[   13.801277]  kunit_try_run_case+0x1a5/0x480
[   13.801557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.801770]  kthread+0x337/0x6f0
[   13.801917]  ret_from_fork+0x116/0x1d0
[   13.802097]  ret_from_fork_asm+0x1a/0x30
[   13.802535] 
[   13.802620] The buggy address belongs to the object at ffff8881029e2200
[   13.802620]  which belongs to the cache kmalloc-64 of size 64
[   13.803457] The buggy address is located 0 bytes to the right of
[   13.803457]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   13.804160] 
[   13.804251] The buggy address belongs to the physical page:
[   13.804629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   13.805087] flags: 0x200000000000000(node=0|zone=2)
[   13.805406] page_type: f5(slab)
[   13.805677] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.806077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.806544] page dumped because: kasan: bad access detected
[   13.806887] 
[   13.806957] Memory state around the buggy address:
[   13.807343]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.807747]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.808137] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.808628]                                      ^
[   13.808945]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.809455]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.809763] ==================================================================
[   14.359514] ==================================================================
[   14.359844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   14.360070] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.360612] 
[   14.360718] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.360763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.360776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.360797] Call Trace:
[   14.360813]  <TASK>
[   14.360828]  dump_stack_lvl+0x73/0xb0
[   14.360853]  print_report+0xd1/0x650
[   14.360874]  ? __virt_addr_valid+0x1db/0x2d0
[   14.360896]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.360918]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.360944]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.360965]  kasan_report+0x141/0x180
[   14.360986]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.361012]  __asan_report_store8_noabort+0x1b/0x30
[   14.361037]  kasan_atomics_helper+0x50d4/0x5450
[   14.361059]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.361081]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.361117]  ? kasan_atomics+0x152/0x310
[   14.361143]  kasan_atomics+0x1dc/0x310
[   14.361166]  ? __pfx_kasan_atomics+0x10/0x10
[   14.361201]  ? __pfx_read_tsc+0x10/0x10
[   14.361231]  ? ktime_get_ts64+0x86/0x230
[   14.361256]  kunit_try_run_case+0x1a5/0x480
[   14.361279]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.361301]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.361323]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.361346]  ? __kthread_parkme+0x82/0x180
[   14.361365]  ? preempt_count_sub+0x50/0x80
[   14.361388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.361412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.361434]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.361457]  kthread+0x337/0x6f0
[   14.361476]  ? trace_preempt_on+0x20/0xc0
[   14.361499]  ? __pfx_kthread+0x10/0x10
[   14.361519]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.361539]  ? calculate_sigpending+0x7b/0xa0
[   14.361563]  ? __pfx_kthread+0x10/0x10
[   14.361584]  ret_from_fork+0x116/0x1d0
[   14.361603]  ? __pfx_kthread+0x10/0x10
[   14.361624]  ret_from_fork_asm+0x1a/0x30
[   14.361655]  </TASK>
[   14.361666] 
[   14.369039] Allocated by task 291:
[   14.369306]  kasan_save_stack+0x45/0x70
[   14.369509]  kasan_save_track+0x18/0x40
[   14.369676]  kasan_save_alloc_info+0x3b/0x50
[   14.369892]  __kasan_kmalloc+0xb7/0xc0
[   14.370067]  __kmalloc_cache_noprof+0x189/0x420
[   14.370297]  kasan_atomics+0x95/0x310
[   14.370465]  kunit_try_run_case+0x1a5/0x480
[   14.370667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.370908]  kthread+0x337/0x6f0
[   14.371045]  ret_from_fork+0x116/0x1d0
[   14.371170]  ret_from_fork_asm+0x1a/0x30
[   14.371365] 
[   14.371463] The buggy address belongs to the object at ffff8881029e2200
[   14.371463]  which belongs to the cache kmalloc-64 of size 64
[   14.371943] The buggy address is located 0 bytes to the right of
[   14.371943]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.372507] 
[   14.372587] The buggy address belongs to the physical page:
[   14.372815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.373130] flags: 0x200000000000000(node=0|zone=2)
[   14.373421] page_type: f5(slab)
[   14.373534] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.373760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.373982] page dumped because: kasan: bad access detected
[   14.374155] 
[   14.374251] Memory state around the buggy address:
[   14.374463]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.374836]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.375183] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.375477]                                      ^
[   14.375627]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.375837]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.376044] ==================================================================
[   13.686017] ==================================================================
[   13.686446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   13.687282] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   13.687647] 
[   13.687728] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.687777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.687792] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.687814] Call Trace:
[   13.687831]  <TASK>
[   13.687847]  dump_stack_lvl+0x73/0xb0
[   13.687874]  print_report+0xd1/0x650
[   13.687922]  ? __virt_addr_valid+0x1db/0x2d0
[   13.687945]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.687966]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.687992]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.688013]  kasan_report+0x141/0x180
[   13.688035]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.688059]  kasan_check_range+0x10c/0x1c0
[   13.688083]  __kasan_check_write+0x18/0x20
[   13.688106]  kasan_atomics_helper+0x4a0/0x5450
[   13.688128]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.688151]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.688176]  ? kasan_atomics+0x152/0x310
[   13.688216]  kasan_atomics+0x1dc/0x310
[   13.688241]  ? __pfx_kasan_atomics+0x10/0x10
[   13.688267]  ? __pfx_read_tsc+0x10/0x10
[   13.688289]  ? ktime_get_ts64+0x86/0x230
[   13.688315]  kunit_try_run_case+0x1a5/0x480
[   13.688339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.688362]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.688403]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.688426]  ? __kthread_parkme+0x82/0x180
[   13.688448]  ? preempt_count_sub+0x50/0x80
[   13.688472]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.688495]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.688519]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.688542]  kthread+0x337/0x6f0
[   13.688561]  ? trace_preempt_on+0x20/0xc0
[   13.688585]  ? __pfx_kthread+0x10/0x10
[   13.688606]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.688627]  ? calculate_sigpending+0x7b/0xa0
[   13.688654]  ? __pfx_kthread+0x10/0x10
[   13.688676]  ret_from_fork+0x116/0x1d0
[   13.688694]  ? __pfx_kthread+0x10/0x10
[   13.688715]  ret_from_fork_asm+0x1a/0x30
[   13.688745]  </TASK>
[   13.688755] 
[   13.696544] Allocated by task 291:
[   13.696715]  kasan_save_stack+0x45/0x70
[   13.696892]  kasan_save_track+0x18/0x40
[   13.697042]  kasan_save_alloc_info+0x3b/0x50
[   13.697180]  __kasan_kmalloc+0xb7/0xc0
[   13.697314]  __kmalloc_cache_noprof+0x189/0x420
[   13.697539]  kasan_atomics+0x95/0x310
[   13.697717]  kunit_try_run_case+0x1a5/0x480
[   13.697911]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.698139]  kthread+0x337/0x6f0
[   13.698362]  ret_from_fork+0x116/0x1d0
[   13.698506]  ret_from_fork_asm+0x1a/0x30
[   13.698652] 
[   13.698738] The buggy address belongs to the object at ffff8881029e2200
[   13.698738]  which belongs to the cache kmalloc-64 of size 64
[   13.699266] The buggy address is located 0 bytes to the right of
[   13.699266]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   13.699749] 
[   13.699834] The buggy address belongs to the physical page:
[   13.700065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   13.700406] flags: 0x200000000000000(node=0|zone=2)
[   13.700600] page_type: f5(slab)
[   13.700775] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.701088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.701383] page dumped because: kasan: bad access detected
[   13.701545] 
[   13.701606] Memory state around the buggy address:
[   13.701749]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.701949]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.702304] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.702610]                                      ^
[   13.702821]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.703151]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.703491] ==================================================================
[   14.393720] ==================================================================
[   14.394078] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   14.394496] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.394818] 
[   14.394935] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.394993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.395006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.395028] Call Trace:
[   14.395040]  <TASK>
[   14.395054]  dump_stack_lvl+0x73/0xb0
[   14.395078]  print_report+0xd1/0x650
[   14.395100]  ? __virt_addr_valid+0x1db/0x2d0
[   14.395122]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.395142]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.395188]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.395218]  kasan_report+0x141/0x180
[   14.395240]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.395266]  kasan_check_range+0x10c/0x1c0
[   14.395290]  __kasan_check_write+0x18/0x20
[   14.395313]  kasan_atomics_helper+0x15b6/0x5450
[   14.395335]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.395357]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.395381]  ? kasan_atomics+0x152/0x310
[   14.395407]  kasan_atomics+0x1dc/0x310
[   14.395438]  ? __pfx_kasan_atomics+0x10/0x10
[   14.395463]  ? __pfx_read_tsc+0x10/0x10
[   14.395484]  ? ktime_get_ts64+0x86/0x230
[   14.395520]  kunit_try_run_case+0x1a5/0x480
[   14.395543]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.395565]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.395588]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.395610]  ? __kthread_parkme+0x82/0x180
[   14.395630]  ? preempt_count_sub+0x50/0x80
[   14.395653]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.395677]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.395700]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.395723]  kthread+0x337/0x6f0
[   14.395744]  ? trace_preempt_on+0x20/0xc0
[   14.395766]  ? __pfx_kthread+0x10/0x10
[   14.395787]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.395807]  ? calculate_sigpending+0x7b/0xa0
[   14.395831]  ? __pfx_kthread+0x10/0x10
[   14.395852]  ret_from_fork+0x116/0x1d0
[   14.395872]  ? __pfx_kthread+0x10/0x10
[   14.395893]  ret_from_fork_asm+0x1a/0x30
[   14.395923]  </TASK>
[   14.395934] 
[   14.402833] Allocated by task 291:
[   14.403010]  kasan_save_stack+0x45/0x70
[   14.403223]  kasan_save_track+0x18/0x40
[   14.403402]  kasan_save_alloc_info+0x3b/0x50
[   14.403587]  __kasan_kmalloc+0xb7/0xc0
[   14.403775]  __kmalloc_cache_noprof+0x189/0x420
[   14.403923]  kasan_atomics+0x95/0x310
[   14.404048]  kunit_try_run_case+0x1a5/0x480
[   14.404216]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.404464]  kthread+0x337/0x6f0
[   14.404656]  ret_from_fork+0x116/0x1d0
[   14.404866]  ret_from_fork_asm+0x1a/0x30
[   14.405083] 
[   14.405210] The buggy address belongs to the object at ffff8881029e2200
[   14.405210]  which belongs to the cache kmalloc-64 of size 64
[   14.405567] The buggy address is located 0 bytes to the right of
[   14.405567]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.406085] 
[   14.406195] The buggy address belongs to the physical page:
[   14.406461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.406771] flags: 0x200000000000000(node=0|zone=2)
[   14.406987] page_type: f5(slab)
[   14.407144] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.407447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.407755] page dumped because: kasan: bad access detected
[   14.407986] 
[   14.408049] Memory state around the buggy address:
[   14.408227]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.408436]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.408644] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.408922]                                      ^
[   14.409148]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.409475]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.409777] ==================================================================
[   14.742617] ==================================================================
[   14.742916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   14.743295] Read of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.743575] 
[   14.743697] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.743743] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.743755] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.743778] Call Trace:
[   14.743791]  <TASK>
[   14.743806]  dump_stack_lvl+0x73/0xb0
[   14.743841]  print_report+0xd1/0x650
[   14.743863]  ? __virt_addr_valid+0x1db/0x2d0
[   14.743885]  ? kasan_atomics_helper+0x4f98/0x5450
[   14.743917]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.743943]  ? kasan_atomics_helper+0x4f98/0x5450
[   14.743964]  kasan_report+0x141/0x180
[   14.743994]  ? kasan_atomics_helper+0x4f98/0x5450
[   14.744020]  __asan_report_load8_noabort+0x18/0x20
[   14.744045]  kasan_atomics_helper+0x4f98/0x5450
[   14.744078]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.744099]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.744124]  ? kasan_atomics+0x152/0x310
[   14.744157]  kasan_atomics+0x1dc/0x310
[   14.744198]  ? __pfx_kasan_atomics+0x10/0x10
[   14.744236]  ? __pfx_read_tsc+0x10/0x10
[   14.744257]  ? ktime_get_ts64+0x86/0x230
[   14.744282]  kunit_try_run_case+0x1a5/0x480
[   14.744305]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.744327]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.744349]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.744371]  ? __kthread_parkme+0x82/0x180
[   14.744401]  ? preempt_count_sub+0x50/0x80
[   14.744424]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.744448]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.744481]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.744504]  kthread+0x337/0x6f0
[   14.744523]  ? trace_preempt_on+0x20/0xc0
[   14.744546]  ? __pfx_kthread+0x10/0x10
[   14.744566]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.744587]  ? calculate_sigpending+0x7b/0xa0
[   14.744611]  ? __pfx_kthread+0x10/0x10
[   14.744632]  ret_from_fork+0x116/0x1d0
[   14.744654]  ? __pfx_kthread+0x10/0x10
[   14.744675]  ret_from_fork_asm+0x1a/0x30
[   14.744705]  </TASK>
[   14.744716] 
[   14.751818] Allocated by task 291:
[   14.751958]  kasan_save_stack+0x45/0x70
[   14.752092]  kasan_save_track+0x18/0x40
[   14.752234]  kasan_save_alloc_info+0x3b/0x50
[   14.752380]  __kasan_kmalloc+0xb7/0xc0
[   14.752557]  __kmalloc_cache_noprof+0x189/0x420
[   14.752770]  kasan_atomics+0x95/0x310
[   14.752996]  kunit_try_run_case+0x1a5/0x480
[   14.753253]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.753505]  kthread+0x337/0x6f0
[   14.753664]  ret_from_fork+0x116/0x1d0
[   14.753838]  ret_from_fork_asm+0x1a/0x30
[   14.754026] 
[   14.754128] The buggy address belongs to the object at ffff8881029e2200
[   14.754128]  which belongs to the cache kmalloc-64 of size 64
[   14.754622] The buggy address is located 0 bytes to the right of
[   14.754622]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.755144] 
[   14.755263] The buggy address belongs to the physical page:
[   14.755481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.755805] flags: 0x200000000000000(node=0|zone=2)
[   14.756026] page_type: f5(slab)
[   14.756216] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.756546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.756859] page dumped because: kasan: bad access detected
[   14.757025] 
[   14.757088] Memory state around the buggy address:
[   14.757302]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.757620]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.757928] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.758264]                                      ^
[   14.758472]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.758681]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.758944] ==================================================================
[   13.986682] ==================================================================
[   13.986944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   13.987279] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   13.987639] 
[   13.987746] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.987792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.987805] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.987828] Call Trace:
[   13.987842]  <TASK>
[   13.987858]  dump_stack_lvl+0x73/0xb0
[   13.987884]  print_report+0xd1/0x650
[   13.987905]  ? __virt_addr_valid+0x1db/0x2d0
[   13.987928]  ? kasan_atomics_helper+0xd47/0x5450
[   13.987949]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.987975]  ? kasan_atomics_helper+0xd47/0x5450
[   13.987996]  kasan_report+0x141/0x180
[   13.988017]  ? kasan_atomics_helper+0xd47/0x5450
[   13.988043]  kasan_check_range+0x10c/0x1c0
[   13.988067]  __kasan_check_write+0x18/0x20
[   13.988090]  kasan_atomics_helper+0xd47/0x5450
[   13.988112]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.988134]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.988158]  ? kasan_atomics+0x152/0x310
[   13.988184]  kasan_atomics+0x1dc/0x310
[   13.988218]  ? __pfx_kasan_atomics+0x10/0x10
[   13.988242]  ? __pfx_read_tsc+0x10/0x10
[   13.988263]  ? ktime_get_ts64+0x86/0x230
[   13.988287]  kunit_try_run_case+0x1a5/0x480
[   13.988310]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.988332]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.988355]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.988377]  ? __kthread_parkme+0x82/0x180
[   13.988397]  ? preempt_count_sub+0x50/0x80
[   13.988420]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.988443]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.988465]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.988489]  kthread+0x337/0x6f0
[   13.988508]  ? trace_preempt_on+0x20/0xc0
[   13.988531]  ? __pfx_kthread+0x10/0x10
[   13.988551]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.988572]  ? calculate_sigpending+0x7b/0xa0
[   13.988596]  ? __pfx_kthread+0x10/0x10
[   13.988617]  ret_from_fork+0x116/0x1d0
[   13.988635]  ? __pfx_kthread+0x10/0x10
[   13.988659]  ret_from_fork_asm+0x1a/0x30
[   13.988689]  </TASK>
[   13.988699] 
[   13.995993] Allocated by task 291:
[   13.996163]  kasan_save_stack+0x45/0x70
[   13.996396]  kasan_save_track+0x18/0x40
[   13.996557]  kasan_save_alloc_info+0x3b/0x50
[   13.996729]  __kasan_kmalloc+0xb7/0xc0
[   13.996909]  __kmalloc_cache_noprof+0x189/0x420
[   13.997101]  kasan_atomics+0x95/0x310
[   13.997255]  kunit_try_run_case+0x1a5/0x480
[   13.997396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.997563]  kthread+0x337/0x6f0
[   13.997785]  ret_from_fork+0x116/0x1d0
[   13.997959]  ret_from_fork_asm+0x1a/0x30
[   13.998201] 
[   13.998290] The buggy address belongs to the object at ffff8881029e2200
[   13.998290]  which belongs to the cache kmalloc-64 of size 64
[   13.998649] The buggy address is located 0 bytes to the right of
[   13.998649]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   13.999167] 
[   13.999263] The buggy address belongs to the physical page:
[   13.999512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   13.999819] flags: 0x200000000000000(node=0|zone=2)
[   14.000007] page_type: f5(slab)
[   14.000153] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.000464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.000750] page dumped because: kasan: bad access detected
[   14.000972] 
[   14.001044] Memory state around the buggy address:
[   14.001278]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.001552]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.001834] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.002048]                                      ^
[   14.002194]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.002411]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.002619] ==================================================================
[   13.852864] ==================================================================
[   13.853218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   13.853993] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   13.854239] 
[   13.854320] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.854366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.854380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.854402] Call Trace:
[   13.854420]  <TASK>
[   13.854436]  dump_stack_lvl+0x73/0xb0
[   13.854465]  print_report+0xd1/0x650
[   13.854486]  ? __virt_addr_valid+0x1db/0x2d0
[   13.854509]  ? kasan_atomics_helper+0x8f9/0x5450
[   13.854530]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.854556]  ? kasan_atomics_helper+0x8f9/0x5450
[   13.854577]  kasan_report+0x141/0x180
[   13.854600]  ? kasan_atomics_helper+0x8f9/0x5450
[   13.854625]  kasan_check_range+0x10c/0x1c0
[   13.854650]  __kasan_check_write+0x18/0x20
[   13.854674]  kasan_atomics_helper+0x8f9/0x5450
[   13.854696]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.854718]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.854742]  ? kasan_atomics+0x152/0x310
[   13.854768]  kasan_atomics+0x1dc/0x310
[   13.854790]  ? __pfx_kasan_atomics+0x10/0x10
[   13.854813]  ? __pfx_read_tsc+0x10/0x10
[   13.854834]  ? ktime_get_ts64+0x86/0x230
[   13.854859]  kunit_try_run_case+0x1a5/0x480
[   13.854910]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.854933]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.854955]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.854978]  ? __kthread_parkme+0x82/0x180
[   13.854999]  ? preempt_count_sub+0x50/0x80
[   13.855022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.855045]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.855068]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.855090]  kthread+0x337/0x6f0
[   13.855109]  ? trace_preempt_on+0x20/0xc0
[   13.855133]  ? __pfx_kthread+0x10/0x10
[   13.855153]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.855173]  ? calculate_sigpending+0x7b/0xa0
[   13.855197]  ? __pfx_kthread+0x10/0x10
[   13.855227]  ret_from_fork+0x116/0x1d0
[   13.855246]  ? __pfx_kthread+0x10/0x10
[   13.855266]  ret_from_fork_asm+0x1a/0x30
[   13.855297]  </TASK>
[   13.855308] 
[   13.862568] Allocated by task 291:
[   13.862691]  kasan_save_stack+0x45/0x70
[   13.862829]  kasan_save_track+0x18/0x40
[   13.863030]  kasan_save_alloc_info+0x3b/0x50
[   13.863307]  __kasan_kmalloc+0xb7/0xc0
[   13.863484]  __kmalloc_cache_noprof+0x189/0x420
[   13.863697]  kasan_atomics+0x95/0x310
[   13.863872]  kunit_try_run_case+0x1a5/0x480
[   13.864030]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.864299]  kthread+0x337/0x6f0
[   13.864483]  ret_from_fork+0x116/0x1d0
[   13.864682]  ret_from_fork_asm+0x1a/0x30
[   13.864819] 
[   13.864898] The buggy address belongs to the object at ffff8881029e2200
[   13.864898]  which belongs to the cache kmalloc-64 of size 64
[   13.865482] The buggy address is located 0 bytes to the right of
[   13.865482]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   13.865893] 
[   13.865957] The buggy address belongs to the physical page:
[   13.866123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   13.866496] flags: 0x200000000000000(node=0|zone=2)
[   13.866720] page_type: f5(slab)
[   13.866918] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.867157] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.867390] page dumped because: kasan: bad access detected
[   13.867651] 
[   13.867738] Memory state around the buggy address:
[   13.867974]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.868311]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.868790] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.868999]                                      ^
[   13.869151]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.869484]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.869790] ==================================================================
[   14.171061] ==================================================================
[   14.171659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   14.171903] Read of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.172117] 
[   14.172192] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.172397] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.172413] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.172513] Call Trace:
[   14.172528]  <TASK>
[   14.172543]  dump_stack_lvl+0x73/0xb0
[   14.172658]  print_report+0xd1/0x650
[   14.172683]  ? __virt_addr_valid+0x1db/0x2d0
[   14.172704]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.172803]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.172829]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.172862]  kasan_report+0x141/0x180
[   14.172885]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.172910]  __asan_report_load4_noabort+0x18/0x20
[   14.173100]  kasan_atomics_helper+0x4a02/0x5450
[   14.173124]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.173159]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.173183]  ? kasan_atomics+0x152/0x310
[   14.173218]  kasan_atomics+0x1dc/0x310
[   14.173241]  ? __pfx_kasan_atomics+0x10/0x10
[   14.173264]  ? __pfx_read_tsc+0x10/0x10
[   14.173285]  ? ktime_get_ts64+0x86/0x230
[   14.173310]  kunit_try_run_case+0x1a5/0x480
[   14.173334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.173355]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.173377]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.173400]  ? __kthread_parkme+0x82/0x180
[   14.173420]  ? preempt_count_sub+0x50/0x80
[   14.173444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.173467]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.173489]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.173512]  kthread+0x337/0x6f0
[   14.173532]  ? trace_preempt_on+0x20/0xc0
[   14.173555]  ? __pfx_kthread+0x10/0x10
[   14.173575]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.173596]  ? calculate_sigpending+0x7b/0xa0
[   14.173618]  ? __pfx_kthread+0x10/0x10
[   14.173640]  ret_from_fork+0x116/0x1d0
[   14.173659]  ? __pfx_kthread+0x10/0x10
[   14.173680]  ret_from_fork_asm+0x1a/0x30
[   14.173710]  </TASK>
[   14.173722] 
[   14.181256] Allocated by task 291:
[   14.181446]  kasan_save_stack+0x45/0x70
[   14.181652]  kasan_save_track+0x18/0x40
[   14.181826]  kasan_save_alloc_info+0x3b/0x50
[   14.182011]  __kasan_kmalloc+0xb7/0xc0
[   14.182272]  __kmalloc_cache_noprof+0x189/0x420
[   14.182593]  kasan_atomics+0x95/0x310
[   14.182862]  kunit_try_run_case+0x1a5/0x480
[   14.183138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.183316]  kthread+0x337/0x6f0
[   14.183432]  ret_from_fork+0x116/0x1d0
[   14.183557]  ret_from_fork_asm+0x1a/0x30
[   14.183689] 
[   14.183845] The buggy address belongs to the object at ffff8881029e2200
[   14.183845]  which belongs to the cache kmalloc-64 of size 64
[   14.184819] The buggy address is located 0 bytes to the right of
[   14.184819]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.188228] 
[   14.188543] The buggy address belongs to the physical page:
[   14.189500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.190253] flags: 0x200000000000000(node=0|zone=2)
[   14.190432] page_type: f5(slab)
[   14.190553] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.190783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.191004] page dumped because: kasan: bad access detected
[   14.191170] 
[   14.192063] Memory state around the buggy address:
[   14.192984]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.193897]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.194828] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.195683]                                      ^
[   14.196363]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.196968]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.197433] ==================================================================
[   14.037182] ==================================================================
[   14.037932] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   14.038267] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   14.038583] 
[   14.038700] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   14.038746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.038759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.038780] Call Trace:
[   14.038795]  <TASK>
[   14.038809]  dump_stack_lvl+0x73/0xb0
[   14.038834]  print_report+0xd1/0x650
[   14.038855]  ? __virt_addr_valid+0x1db/0x2d0
[   14.038877]  ? kasan_atomics_helper+0xf10/0x5450
[   14.038899]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.038924]  ? kasan_atomics_helper+0xf10/0x5450
[   14.038946]  kasan_report+0x141/0x180
[   14.038967]  ? kasan_atomics_helper+0xf10/0x5450
[   14.038993]  kasan_check_range+0x10c/0x1c0
[   14.039016]  __kasan_check_write+0x18/0x20
[   14.039039]  kasan_atomics_helper+0xf10/0x5450
[   14.039061]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.039083]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.039107]  ? kasan_atomics+0x152/0x310
[   14.039132]  kasan_atomics+0x1dc/0x310
[   14.039155]  ? __pfx_kasan_atomics+0x10/0x10
[   14.039178]  ? __pfx_read_tsc+0x10/0x10
[   14.039199]  ? ktime_get_ts64+0x86/0x230
[   14.039233]  kunit_try_run_case+0x1a5/0x480
[   14.039256]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.039278]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.039300]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.039323]  ? __kthread_parkme+0x82/0x180
[   14.039343]  ? preempt_count_sub+0x50/0x80
[   14.039366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.039389]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.039411]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.039434]  kthread+0x337/0x6f0
[   14.039453]  ? trace_preempt_on+0x20/0xc0
[   14.039475]  ? __pfx_kthread+0x10/0x10
[   14.039496]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.039516]  ? calculate_sigpending+0x7b/0xa0
[   14.039540]  ? __pfx_kthread+0x10/0x10
[   14.039561]  ret_from_fork+0x116/0x1d0
[   14.039579]  ? __pfx_kthread+0x10/0x10
[   14.039600]  ret_from_fork_asm+0x1a/0x30
[   14.039629]  </TASK>
[   14.039639] 
[   14.046763] Allocated by task 291:
[   14.046930]  kasan_save_stack+0x45/0x70
[   14.047117]  kasan_save_track+0x18/0x40
[   14.047408]  kasan_save_alloc_info+0x3b/0x50
[   14.047551]  __kasan_kmalloc+0xb7/0xc0
[   14.047675]  __kmalloc_cache_noprof+0x189/0x420
[   14.047822]  kasan_atomics+0x95/0x310
[   14.047947]  kunit_try_run_case+0x1a5/0x480
[   14.048085]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.048303]  kthread+0x337/0x6f0
[   14.048466]  ret_from_fork+0x116/0x1d0
[   14.048715]  ret_from_fork_asm+0x1a/0x30
[   14.048907] 
[   14.048995] The buggy address belongs to the object at ffff8881029e2200
[   14.048995]  which belongs to the cache kmalloc-64 of size 64
[   14.049783] The buggy address is located 0 bytes to the right of
[   14.049783]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   14.050292] 
[   14.050367] The buggy address belongs to the physical page:
[   14.050572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   14.050891] flags: 0x200000000000000(node=0|zone=2)
[   14.051103] page_type: f5(slab)
[   14.051285] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.051517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.051737] page dumped because: kasan: bad access detected
[   14.051899] 
[   14.051960] Memory state around the buggy address:
[   14.052107]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.052447]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.052761] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.053155]                                      ^
[   14.053582]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.053875]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.054082] ==================================================================
[   13.583358] ==================================================================
[   13.583721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   13.583993] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291
[   13.584417] 
[   13.584595] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   13.584644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.584659] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.584680] Call Trace:
[   13.584694]  <TASK>
[   13.584709]  dump_stack_lvl+0x73/0xb0
[   13.584734]  print_report+0xd1/0x650
[   13.584755]  ? __virt_addr_valid+0x1db/0x2d0
[   13.584776]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.584796]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.584821]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.584842]  kasan_report+0x141/0x180
[   13.584863]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.584887]  __asan_report_store4_noabort+0x1b/0x30
[   13.584911]  kasan_atomics_helper+0x4ba2/0x5450
[   13.584932]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.584953]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.584976]  ? kasan_atomics+0x152/0x310
[   13.585000]  kasan_atomics+0x1dc/0x310
[   13.585021]  ? __pfx_kasan_atomics+0x10/0x10
[   13.585044]  ? __pfx_read_tsc+0x10/0x10
[   13.585064]  ? ktime_get_ts64+0x86/0x230
[   13.585088]  kunit_try_run_case+0x1a5/0x480
[   13.585111]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.585132]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.585153]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.585175]  ? __kthread_parkme+0x82/0x180
[   13.585195]  ? preempt_count_sub+0x50/0x80
[   13.585229]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.585252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.585274]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.585296]  kthread+0x337/0x6f0
[   13.585315]  ? trace_preempt_on+0x20/0xc0
[   13.585337]  ? __pfx_kthread+0x10/0x10
[   13.585357]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.585377]  ? calculate_sigpending+0x7b/0xa0
[   13.585399]  ? __pfx_kthread+0x10/0x10
[   13.585420]  ret_from_fork+0x116/0x1d0
[   13.585485]  ? __pfx_kthread+0x10/0x10
[   13.585506]  ret_from_fork_asm+0x1a/0x30
[   13.585536]  </TASK>
[   13.585546] 
[   13.595537] Allocated by task 291:
[   13.596075]  kasan_save_stack+0x45/0x70
[   13.596237]  kasan_save_track+0x18/0x40
[   13.596513]  kasan_save_alloc_info+0x3b/0x50
[   13.596931]  __kasan_kmalloc+0xb7/0xc0
[   13.597103]  __kmalloc_cache_noprof+0x189/0x420
[   13.597521]  kasan_atomics+0x95/0x310
[   13.597676]  kunit_try_run_case+0x1a5/0x480
[   13.597866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.598266]  kthread+0x337/0x6f0
[   13.598431]  ret_from_fork+0x116/0x1d0
[   13.598848]  ret_from_fork_asm+0x1a/0x30
[   13.598994] 
[   13.599082] The buggy address belongs to the object at ffff8881029e2200
[   13.599082]  which belongs to the cache kmalloc-64 of size 64
[   13.600017] The buggy address is located 0 bytes to the right of
[   13.600017]  allocated 48-byte region [ffff8881029e2200, ffff8881029e2230)
[   13.600770] 
[   13.600868] The buggy address belongs to the physical page:
[   13.601251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   13.601590] flags: 0x200000000000000(node=0|zone=2)
[   13.601746] page_type: f5(slab)
[   13.602106] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.602676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.602993] page dumped because: kasan: bad access detected
[   13.603319] 
[   13.603403] Memory state around the buggy address:
[   13.603641]  ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.604371]  ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.604762] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.605074]                                      ^
[   13.605622]  ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.605966]  ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.606305] ==================================================================